SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : VOLTAIRE'S PORCH-MODERATED -- Ignore unavailable to you. Want to Upgrade?


To: stockman_scott who wrote (43675)10/29/2001 8:13:59 PM
From: Dealer  Respond to of 65232
 
A F T E R H O U R S .. Q U O T E S & EARNINGS REPORT DATES

Voltaire's Porch Basket of Stocks

These Stock Have Not Been Picked By Any One Individual

GORILLA--A company that controls it market because it has a discontinuous innovation ,one that is not compatible with existing systems. The market is in a hyper growth stage, and they control the architecture. There is a high switching cost to using some other company's product.

KING--The Market leader, properly with a two-times lead or better over its closest competitor. If the lead shrinks too far, the king becomes a prince, and we have a kingless market. Because they lack architectural control, and because switching costs are low, they cannot force competitors onto the defensive the way Microsoft, Intel, or Cisco can. Compaq is a king. Seagate is a king of hard drives.

A lot of study has been done on these stocks by the Gorilla and Kings thread. There are the stocks that are discussed most often on the porch........and 1 or more are in most porcher's portfolio.

The following Stocks are on the Gorilla and King Index (*)or the Gorilla and King Watchlist

SYMBOL---EARNINGS DATE

BRCM---10/17
CLOSE 34.48
AFTERHOURS 33.61

CREE---10/11
CLOSE 17.85
AFTERHOURS 17.57

*CSCO---11/05
CLOSE 16.42
AFTERHOURS 16.13

ELON---10/11
CLOSE 14.60
AFTERHOURS 14.50

EMC---10/17
CLOSE 12.95
AFTERHOURS 12.85

*GMST---11/12
CLOSE 20.14
AFTERHOURS 19.95

*INTC---10/16
CLOSE 24.18
AFTERHOURS 23.90

ITWO---10/16
CLOSE 4.54
AFTERHOURS 4.55

*JDSU---10/25
CLOSE 8.33
AFTERHOURS 8.17

*NTAP--- 11/13
CLOSE 11.78
AFTERHOURS 11.60

ORCL---12/17
CLOSE 13.40
AFTERHOURS 13.28

PMCS---10/18
CLOSE 16.13
AFTERHOURS 15.80

*QCOM--- 11/06
CLOSE 52.30
AFTERHOURS 52.00

RMBS---10/16
CLOSE 8.61
AFTERHOURS 8.61

RNWK---10/16
CLOSE 6.09
AFTERHOUR 6.05

*SEBL---10/17
CLOSE 17.25
AFTERHOURS 17.00

SNDK---10/17
CLOSE 11.08
AFTERHOURS 11.07

SSTI---10/15
CLOSE 8.97
AFTERHOURS 8.72

SUNW---10/18
CLOSE 9.86
AFTERHOURS 9.69

WIND---11/15
CLOSE 15.26
AFTERHOURS 14.80

The Watch & Wait Index consists of stocks that have some desirable characteristics but are not necessarily Gorillas or Kings - at least not yet. Most of them will not be, but they bear watching for that possibility.

EARNINGS RELESE DATES EARNING FOR THE ABOVE STOCKS + OTHER STOCKS THAT HAVE BEEN DISCUSSED ON THE PORCH AND ALSO THEIR COMPETITORS.

STOCK REPORTING DATES------ COMPETITORS

OCT 09
MOT-----ERICY, NOK, LU

OCT 11
CREE–-----HWP
ELON------
JNPR------NT

OCT 15
SSTI------ ATML, INTC, SNDK
NVLS------AMAT

OCT 16
RMBS------MU
INTC------TXN
ITWO------
RNWK------APPL, MSFT, AOL
IBM------HWP, CPQ, DELL

OCT 17
EMC------NTAP
BRCM------ LU, TXN
SEBL------
SNDK------SSTI
NEWP------VECO, COHR
AOL------RNWK
TXN------INTC, BRCM

OCT 18
PMCS------
SUNW------ CPQ, IBM, MSFT
ATML------SSTI
MSFT------RNWK, SUNW
NT------ADCT, CIEN, JNPR

OCT 19
NOK------QCOM, MOT

OCT 22
CPQ------HWP, IBM, DELL

OCT 23
LU------BRCM, ERICY, JDSU, CSCO, CIEN

OCT 25
JDSU------LU, NEWP

OCT 26
VECO------NEWP, AMAT
ERICY------LU, MOT, NOK

OCT 31
COHR------NEWP

NOV 5
CSCO------LU

NOV 6
QCOM------ ERICY, MOT, NOK

NOV 12
GMST------
HWP------IBM, CPQ

NOV 13
NTAP------SUNW, EMC
PLUS------ITWO

NOV 14
AMAT------JDSU. NVLS

NOV 15
WIND------MSFT
DELL------CPQ, HWP

NOV 26
BRCD------SUNW, MCDTA
ADCT------CSCO, NT

DEC 6
CIEN------ADCT, LU, CSCO

DEC 17
ORCL------
MU------RMBS



To: stockman_scott who wrote (43675)10/31/2001 4:07:25 AM
From: Sully-  Respond to of 65232
 
From Scott :-o

Combating Terrorism Targets and Objectives

Tuesday, October 30, 2001; 7:41 PM

The Pentagon on October 25 issued an appeal to contractors for new tools to combat terrorism. The full instructions are available here in PDF format. Following is a list of the sought-after technologies:

R-100 Combating Terrorism

This topic area includes but is not limited to finding suspected terrorists, predicting the future behavior of terrorists, finding weapons and support equipment that could be used by terrorists, detection and warning of terrorist activities, rapidly configuring protection and defensive measures against terrorist action and recovery from terrorist actions.

R-101 Automated Speaker Recognition System

Incorporate Pashtu, Urdu, Farsi, Arabic dialects, and other minor Middle Eastern and central/south Asian languages into an existing Automated Speaker Recognition System. Integrate advanced language recognition and change detection algorithms to detect changes and identify language within speech data containing multiple languages, short segments (10 - 30 seconds) and over degraded channels. Develop corpus collection/database to support this project. Incorporate open system architecture to permit client-server use by selected intelligence and counterintelligence agencies.

R-102 Computer and Information Operations

Develop a family of tools for the detection, extraction, storage, transmission, scanning, and forensic analysis of computer media, PDAs, and digital audiovisual imagery. Emphasis will be on tools for high performance analysis (forensic intrusion, data, media, network and hierarchical visual information), decryption, steganography, and forensic knowledge based application.

R-103 Tagging, Tracking, Locating and Remote Sensors

Develop tags/sensors that allow remote monitoring of real/near real-time movement of forces and resources.

Both line-of-sight and non-line-of-sight methods are acceptable. Methods may be either passive or active.

This includes monitoring of civilian as well as military targets. Networked autonomous systems that provide a fused picture of the environment and movements are desireable.

R-104 Locating Faces in Video Images

Develop improved algorithms for identifying that a 2-D video image or sequence of images contains one or more human faces, locating those faces precisely in the image(s) and counting the number of different faces. We are primarily interested in "natural environments" with unconstrained lighting and pose angle, where image resolution exceeds 50-pixel interocular distance. Integration with emerging U.S. government test datasets will be required.

R-105 Identifying Faces in Video Images

Develop improved algorithms for identifying faces from video sequences under unconstrained lighting and pose conditions. Of particular interest is the refinement of basis sets for image-based approaches, creation of model-based methods using 2-D input with potential for "real time" applications, and study of decision optimization with multiple, highly correlated images. Demonstration of algorithms using emerging U.S. government test datasets will be required.

R-106 Video Human Tracking

Develop a system for tracking a single person through multiple sequential 2-D video images or through multiple cameras in uncontrolled lighting environments.

R-107 Voice Print Identification

Develop a system to use voice prints to locate, track, and correlate suspected terrorists and their associates. Develop the technology to identify specific foreign language speakers based on a short sample of voice data collected from intelligence, law enforcement or media sources. Technology must interface with collection databases of voice samples and provide a mechanism for the distribution and use of resultant "speaker id" products. The identification technology should incorporate current state of the art and provide linkage to emerging developing technologies from academia, industry and government labs. System should have the ability to automatically establish and track correlations and build the identification objects, while also providing a robust suite of voice analyst assistant tools for parsing and analyzing the speech data.

Develop the ability to handle multiple channel effects and noise degradation from degraded or low quality channels.

R-108 Terrorist Behavior and Actions Predictions Technology

Develop an integrated information base and a family of data mining tools and analysis aids to assist the analyst and the identification of patterns, trends and models of behavior of terrorist groups and individuals.

This would include information fusion of diverse intelligence, law enforcement and cultural data into a common form assessable to state of the art data mining and analytic tools. Included would be visualization and display tools for understanding the relationships between persons, events and patterns of behaviors. The system would allow "what if " type modeling of events and behavioral patterns and result in predictive analysis products with specific elements of information to confirm or deny the hypothesis of the various models. The resulting predictions and hypothesis models should form the basis of a planning and "course of action" tool for US/Allied actions in confirming predictions or disrupting behaviors.

R-109 Information Integration Center

Develop the ability to readily store, catalogue and correlate data that will be identified in the course of an investigation and analysis of suspected terrorist activity.

R-110 Physical Security

This topic area covers research and development projects that satisfy requirements for physical security support to protect personnel, equipment and facilities against terrorist activity. This includes development of equipment and systems to safeguard personnel, prevent or delay unauthorized access to facilities and installations, and to protect against terrorist threats and sabotage. It further includes methods of mitigating the effects of blast on structures.

R-111 Ports of Entry Passenger Screening Aid

Develop a deception detection device for use with counterterrorism based structured interviews for passengers of the various modes of transportation. The system should apply known relationships between electrodermal activity and the detection of deception in a polygraph to a portable device. Consideration will be given to alternate approaches and sensors. Emphasis should be placed on processing time.

R-120 Advanced Distributed Learning (ADL)

This topic area focuses on the research and development of ADL technologies to enhance the operational readiness of all elements involved in combating terrorism and consequence management. This includes development of ADL delivery systems, architectures, and infrastructures; models, tools, and procedures to enable the cross platform shared use and reuse of training materials; and tools, techniques, and guidelines for creating high quality, standardized training materials.

R-200 Location and Defeat of Hard or Difficult Targets

This topic area includes but is not limited to technologies for locating, characterizing, planning and practicing mission options, destroying, and damage assessment of underground facilities, highly camouflaged (natural or artificial), or otherwise hidden targets that may house terrorists or terrorist activities.

R-201 Detection and Mapping of Underground Facilities

Develop a system to detect, locate, and map underground/concealed cavities that may serve as secure havens for terrorists. Applicable methods may include ground penetrating radar, acoustics, and unconventional surveillance and reconnaissance.

R-210 Tactical Operations Support

This topic area covers research and development projects that satisfy requirements for equipment and systems to support specialized force offensive operations directed against terrorist activities and groups.

This includes reducing the support and infrastructure of terrorist organizations through Psychological Operations and Civil Affairs (reducing popular support and credibility of the terrorist organizations), and through Foreign Internal Defense augmentation, training and equipping indigenous professional military units to fight terrorists.

R-300 Protracted Operations in Remote Locations

This topic area includes but is not limited to technologies that contribute to mission performance including the sustainment and protection of small military units that are deployed in remote areas for extended periods of time. This area also includes technologies that: support the efficient infiltration and exfiltration of military forces and equipment; placement and data access of remote sensors (either stationary or mobile); communication and coordination of operations between and among command centers and remotely located forces; enhanced situational awareness including data fusion; and other technologies that contribute to reconnaissance, direct action, or psychological operations and civil affairs. Remote locations are geographical areas characterized by rugged terrain, presence of hostile forces, and politically denied access. Systems that can fuse multiple sensors into a common picture are desired. Unconventional surveillance and reconnaissance systems are desired.

R-301 Early Warning Devices

Develop early warning capability to alert tactical forces of near presence of non-friendly personnel or vehicles. Included in this requirement are detection systems that identify electromagnetic emissions or acoustic systems. Systems must be rugged and if remote sensors are used, the sensors must be easily hidden in the terrain.

R-310 Direct Action

This topic area includes but is not limited to enhancing direct action capabilities including improved situational awareness for assault units, improved accuracy and lethality of weapons, weapons for special situations, and light-weight personal armor that stops both weapons and knife penetration with full body protection.

R-311 Specialty Munitions

Develop special purpose long-range munitions that will enhance special operations mission requirements and are compatible with standard, fielded weapon systems. Included but not limited in this requirement is ability to provide standoff guidance to specified targets without exposing friendly force.

R-312 Advanced Tactical Imaging Systems

Develop small, weapons-mounted or hand-held systems that provide full exploitation of the imaging spectrum (optical and thermal) to provide quality images that support targeting and offensive operation in environments obscured by smoke, haze, fog, or darkness. System capability must be agile and adjustable to the specific environment in order to take best advantage of the available spectrum.

R-313 Advanced Breaching Tools

Develop tools, methods, or systems that will allow controlled breaching of objectives in a manner that limits collateral effects to the structure or to personnel in the vicinity of the breach point. Breaching of masonry, structural metallic, or other systems may be addressed. Systems must be man portable and be designed to be consistent with operation by small tactical teams.

R-314 Through-Wall Imaging

Develop high fidelity through-wall imaging capability. System must provide accurate location and number of personnel as well as map out the area being imaged. The system must include a user-friendly display that is easily interpreted by tactical force personnel. The display must be night vision compatible, and be rugged enough to support typical tactical operations scenarios. The system should be man portable and operate on its own power supply, but, able to use external power if available.

R-400 Countermeasures to Weapons of Mass Destruction

This topic area includes but is not limited to technologies to monitor, detect and characterize purposely concealed chemical, biological, radiological, nuclear (CBRN) and high-explosive substances; safely destroy or render harmless CBRN, and high-explosive substances or manufacturing facilities; screen personnel and their belongings in potential risk areas (airports, embassies, border crossings, or other portal locations); positively identify known terrorists that may be associated with weapons of mass destruction; quickly and positively identify the nature and source as well as predict the impact of weapons of mass destruction after their release; and forensic methods to quickly identify terrorists who have released weapons of mass destruction. Also desired are systems that include database and data mining tools to identify common times, places, contacts, and other commonalities between suspects.

R-401 Identifying Terrorists Involved with Weapons of Mass Destruction

Develop methods to determine if terrorists have worked with weapons of mass destruction. Identify and characterize the chemical and/or physical changes resulting from intermittent less than lethal exposure to chemical warfare nerve, blister, blood and choking agents; radiation from nuclear weapons or potential radiological dispersion devices; and biological warfare agents. These phenomena shall be used to develop expedient field assays (desired) and devise definitive laboratory protocols (required) to positively associate alleged terrorists in custody with exposure to one or more types of weapons of mass destruction. The matrices of interest include clothing, hair, skin, blood, bodily wastes, teeth and bone. The chemical and/or physical changes must be sufficiently stable to be detectable days to weeks after the individual's exposure.

The ability to identify instances of repeated exposure and to estimate the time elapsed since the last exposure is desired.

R-402 Entry Point Screening for Improvised Explosive Devices, Chemical and Radiological Weapons

Develop an entry point screening system with integrated sensor technology to detect improvised explosive devices (IED), and chemical and radiological weapons. Novel detection technology needs to be integrated with existing sensor systems for detecting explosives, chemical and radiological material. Fixed and mobile entry point screening systems need to be developed in order to support permanent base and expeditionary force protection operations.

R-410 Chemical, Biological, Radiological, and Nuclear Countermeasures

This topic area covers research and development projects that satisfy user requirements to counter the terrorist employment of chemical, biological, radiological or nuclear (CBRN) materials.

R-411 Pre-release Detection of Chemical and Biological Agents

Develop a system to detect chemical warfare agents (CWAs), biological warfare agents (BWAs) and selected toxic industrial chemicals (TICs) prior to release in a terrorist attack. Rapid warning of a potential CWA, BWA or TIC release would permit security force personnel to prevent or contain the release and warn personnel to take life saving countermeasures. Pre-release detection capability will provide point detection and alarm within two minutes against the following prioritized CWAs: Nerve agents (GA, GB, GD, GF, VX) (required); Blood Agents (AC and CK) (required); Blister Agents (all H series, L, HL and CX) (desired); TICS with IDLH less than 10ppm (desired); and BWAs: Bacteria, e.g., anthrax; plague; tularemia; toxins; and viruses. Detection may be based on decomposition products, byproducts or other residues from the synthesis or culture process. Contact with the container and surface swipes may be performed in the sampling process.

R-412 Air Sampler and Aerosol Collector

Develop a miniaturized device to continuously monitor and record data on airborne particulate levels for a period of up to 7 days required (30 days desired). The device shall be small, able to operate autonomously to count, categorize and collect airborne particulate matter. The device shall be able to distinguish biological from non-biological particles. It shall exclude particles larger than 25 microns and detect particles down to 0.01 micron in size. The device shall be capable of computing a binary trigger signal based on current and past environmental parameter values, providing the signal to flag a collection event for subsequent analysis after recovery. The device shall have a maximum weight of 2KG and a maximum volume of 1L. The device shall remain operational at temperatures from -20 to 50 degrees C.

R-413 WMD Release Source Prediction

Develop a system to quickly ascertain the location and characteristics of the source a WMD release from remote sensing or from air and/or surface sampling for input into military or other government models to predict the impact of the release and plan response measures. Quick identification of the source can support efforts to mitigate the release and collect critical transient evidence to help identify the perpetrator.

The source of a covert CBR release may not be readily apparent requiring the timely deployment of remote sensing capability, a grid of expendable air samplers or a surface sampling plan if the plume has dissipated.

The sensor/sampling grid shall be of sufficient density and accuracy to for the application to have a 95% probability of converging on a source location within 100 meters.

R-414 Expedient Chemical and Biological Agent Battlefield Neutralization

Develop procedures for the rapid and expedient neutralization of suspected chemical or biological agents in containers or improvised production facilities using military explosives or other methods with minimal additional logistical burden. The procedures shall address quantity, placement, and stand-off distances with and without personal protective equipment.

R-415 Field Confirmatory Biological Analysis

Develop a portable (<10kg) battery-powered device to process and analyze aqueous samples (<10ml) for the presence of and to identify viable or dead known biological warfare agents (at least eight per sample based on multiple target signatures). With minimal preprocessing of samples, the system must be capable of analyzing ground water, natural surface water, wastewater and aqueous extraction from an intermediate capture medium. In addition to suspended organic and inorganic particulates, the samples may contain a wide range of organic and inorganic solutes including those from spent growth media. Consumables should be shelf stable without refrigeration and self-contained. If required antibodies and nucleic acid probes will be provided as GFE, for simulants (unclassified) during development and actual agents (classified) for deployment. The sample preprocessing and analysis shall take no longer than one hour and there shall be no cross contamination between samples. The system shall be capable of being decontaminated in the field. False positive and false negative rates shall be minimized and probable minimum detectable level of pathogens and toxins shall be specified. Threshold: Bench top system in a simple laboratory to be operated by a trained technician. Objective: Field deployable system to be operated with no specialized molecular biology knowledge after minimal training.

R-416 WMD Material Assessment

Develop database that can be used to track, associate, evaluate and assess procurement of WMD associated materials, including equipment, machinery, precursor and sub-precursor materials, and to highlight abnormal behavior patterns. Database should integrate inputs from purchases of materials or equipment that could be used to manufacture WMD weapons. Transactions to be tracked include use of credit cards, checks, purchase orders, cash, etc. Database should permit records of WMD associated materials procured in unusual quantities to be documented by retailers/wholesalers/manufacturers and reported to appropriate Homeland Defense authorities.

R-420 Explosives Detection

This topic area covers research and development projects that satisfy requirements for existing and emerging technology in the area of explosives detection and diagnostics. Emphasis is on long-term sustained approachs to develop technologies for detection and subsequent characterization of concealed explosives.

R-421 Standoff Detection

Develop technologies that lead to a standoff explosive detection capability for screening people and vehicles at distances of no less than 20 feet with desired goal of 200 feet.

R-422 Handheld Detectors

Develop next generation explosives detectors. Efforts must result in reduced cost and size and have increased duty cycle. Based on existing parameters for handheld detectors the next generation system will have a weight of less than two pounds and cost no more than 10,000 dollars per system.

R-423 Walkthrough Portals for Personnel Screening

Develop portals that do not require people undergoing screening to remain stationary. This walkthrough capability should provide as a minimum detection rates for explosives of greater than 95% with a less than 1% false alarm rate. These portals should also be configured to allow for integration of other sensors such as metal detectors and imaging systems such as low dose x-ray or millimeter wave devices.

R-430 Improvised Device Defeat

This topic area covers research and development projects that satisfy requirements to more safely and effectively render terrorist devices safe. Particular emphasis is placed on technologies that safely diagnose and defeat terrorist improvised explosive devices (IEDs), improvised chemical and biological devices, and large vehicle bombs (LVBs).

R-431 Standoff Large Vehicle Bomb (LVB) Diagnostics

Develop systems to accurately locate and identify components of Large Vehicle Bombs containing explosives and/or chemical, biological, radiological and nuclear (CBRN) agents to increase the capabilities of military explosive ordnance disposal (EOD) units and federal, state and local bomb technicians to apply effective, field transportable, robust diagnostics while interrogating a suspect large vehicle bomb. Real-time feedback to the operator is essential in order to facilitate the use of follow-on neutralization systems. Also, in order to minimize risk to operators, standoff or remote capabilities are highly desirable. Factors that may limit the utility or availability of the equipment, such as size, cost, and deployment and usage times, should be given major consideration.

R-432 Large Vehicle Bomb Neutralization

Develop systems to facilitate the rapid neutralization of Vehicle-Borne explosive, chemical, biological, nuclear and radiological devices. Systems must address the ability to disrupt multiple threat type vehicles without causing the device to initiate or detonate. Threat vehicles include, but are not limited to, vans, tractor- trailers, fuel tanks, sewage trucks, water tankers, etc. To minimize operator risk, consideration should be given to using remote employment techniques leveraging existing robotic systems to the greatest extent possible. Further consideration should be given to making the system available to both military and civilian EOD communities, ease of deployment, and system size.

R-433 Large Vehicle Bomb (LVB) Containment and Mitigation

Develop portable and semi-permanent systems and techniques that will reduce the damage both in overpressure and fragmentation caused by the functioning of a Large Vehicle Bomb. Systems should be capable of rapid deployment and use standard materials that will mitigate the effects of LVB's. Ideally, the techniques or systems should provide a reduction of 50% of the air blast. Remote operation of the tools with robotic vehicles/systems is highly desirable.

R-434 Precision Disruption Tools

Develop precision explosive ordnance disposal procedures. Improvised thermobaric devices, improvised biological and chemical weapons of mass destruction mandate the development of precision disruption technology. The current methods are crude and cause collateral damage. Applying these antiquated render safe techniques could cause the inadvertent release of the improvised material. Development of precision disruption tools that will "peel back" and expose the inner contents to allow surgical separation of components without inadvertent release of the improvised material is required. Developments in lasers and precision surgery techniques that use computer controls are needed to allow for precise disassembly ofimprovised terrorist devices.

© 2001 Washington Post Newsweek Interactive
washingtonpost.com



To: stockman_scott who wrote (43675)11/1/2001 2:11:11 AM
From: Sully-  Respond to of 65232
 
From SS.............

Afghanistan veterans have some advice for US

smh.com.au



To: stockman_scott who wrote (43675)11/1/2001 2:16:29 AM
From: Sully-  Respond to of 65232
 
More from SS...........

We must never forget why we're waging war, says Blair

In a speech to the Welsh Assembly yesterday, British Prime Minister Tony Blair said the public must remember the reasons why the war on terrorism is being waged..............

smh.com.au



To: stockman_scott who wrote (43675)11/1/2001 2:19:08 AM
From: Sully-  Respond to of 65232
 
CIA agent 'visited bin Laden in hospital'

Osama bin Laden underwent treatment in July at the American Hospital in Dubai, where he met a CIA official, the French newspaper Le Figaro and Radio France International reported yesterday...................

smh.com.au



To: stockman_scott who wrote (43675)11/2/2001 2:51:24 PM
From: elpolvo  Respond to of 65232
 
Tell Polvie that I unconditionally accept others but I felt that editorial letter that someone else posted might stimulate an interesting discussion.

stock dude-

i know... and it did. <g>

good work. thanks.

now quit goofing off and get yer @ss
back to work on the porch.

-polvie



To: stockman_scott who wrote (43675)11/2/2001 2:58:17 PM
From: Sully-  Respond to of 65232
 
Police Say Have Suspect in German Anthrax Packages

Friday November 2 2:24 PM ET

KIEL, Germany (Reuters) - German police said on Friday they had
identified a suspect in connection with two packages found in the
northern town of Neumuenster which preliminary tests showed were
contaminated with anthrax.

``We have a definite person under suspicion but we must continue our
investigation,'' Joerg Ziercke, a spokesman for police in the northern city
of Kiel, told journalists.

The suspect was not in custody. Further details were not available.

Ziercke said their investigation showed that a total of 30 packages with
suspicious contents were left in various locations in Neumuenster,
including a pedestrian zone and a nearby forest.

Of these, 21 had been discovered so far. It was not clear how police
had come to the conclusion there were 30 in total.

One of the packages was open when the police found it and subsequent
tests showed it was contaminated with anthrax, Ziercke said. Police
were seeking anyone who may have come into contact with the contents
of the packages.

Earlier, the regional health minister for the area, in the state of
Schleswig-Holstein, said initial tests on two of the packages had
confirmed initial suspicions of anthrax.

The packages from Neumuenster were being tested at the Robert Koch
Institute in Berlin, a national center for disease control.

The institute was also testing a letter received by a labor office in the
eastern state of Thuringia. Provisional tests on this letter also confirmed
the presence of anthrax.



To: stockman_scott who wrote (43675)11/5/2001 10:21:33 AM
From: Sully-  Respond to of 65232
 
Qualcomm Readies Launch in China

RELATED SYMBOLS: (QCOM)

SAN DIEGO, Nov 02, 2001 (North County Times - Knight Ridder/Tribune Business
News via COMTEX) -- More than 15 million people in China will be using
Qualcomm's wireless technology by early next year, Qualcomm Chairman and Chief
Executive Irwin M. Jacobs said Thursday.

If true, Qualcomm would clearly have a firm foothold in the world's biggest
wireless market.

Moreover, Jacobs said, the next-largest market, India, is adopting Qualcomm's
Code Division Multiple Access technology as a replacement for wireline phones.
Jacobs spoke at the CDMA Americas Congress, held at the San Diego Convention
Center.

Jacobs and techno-futurist George Gilder said Qualcomm's technology will bring
the wireless industry out of its current downturn by delivering services
customers want more cheaply than competing technologies.

Qualcomm is one of San Diego County's largest private employers and its stock is
worth a total of $39.2 billion, the most of any in the county. The company makes
money from wireless companies that license its technology for wireless
communications.

Qualcomm has been hurt like other telecom companies by the slump, with its stock
down about two-thirds from its peak price, reached at the beginning of last
year. Its stock closed Thursday at $51.63 per share, up slightly more than 5
percent for the day.

Perry LaForge, chairman of the CDMA Development Group, said the telecom industry
had to take responsibility for the slowdown.

"We brought it on ourselves," LaForge said. "We overpromised and
underdelivered."

LaForge and Jacobs said the wireless industry will recover by adopted so called
"3G" standards that will transmit data faster, enabling wireless phones to do
more.

Jacobs said Qualcomm's technology is now used by more than 100 million
subscribers worldwide. However, it is still less popular than competing
technologies such as Global System for Mobile Communications (GSM). This makes
China a critical test for Qualcomm, because the country had previously begun to
adopt GSM.

Earlier this year, China appeared to firmly commit to deploy Qualcomm's
technology. Jacobs said Chinese wireless carriers and equipment manufacturers
are carrying through on that commitment by installing the needed infrastructure.

Jacobs illustrated his talk with a chart stating that Chinese carriers are
placing networks with Qualcomm's technology in more than 300 major cities.

In India, he added, New Delhi now has 50,000 wireless subscribers using
Qualcomm's technology. India has also been a pro-GSM stronghold.

Qualcomm is now introducing an improved version of its technology, called CDMA
2000. This is one of several so-called "3G" wireless standards that promise
faster data transmission. Another, called WCDMA, is partially based on
Qualcomm's technology.

Jacobs said Qualcomm's technology will better enable wireless carriers to
deliver services customers want, such as easy Internet access, including video
and fast data transmission. Wireless carriers will benefit by getting more voice
capacity, lowering their costs per subscriber.

By Bradley J. Fikes
To see more of the North County Times, or to subscribe to the newspaper, go to nctimes.com

(c) 2001, North County Times, Escondido, Calif. Distributed by Knight Ridder/Tribune Business News.

-0-

(Public Company & Wall Street & Business & High Tech)



To: stockman_scott who wrote (43675)11/5/2001 11:13:59 AM
From: Sully-  Respond to of 65232
 
China's Huawei acquires licence for CDMA network products from QUALCOMM

RELATED SYMBOLS: (QCOM)

Nov 05, 2001 (TELECOMWORLDWIRE via COMTEX) -- The US digital wireless
technology developer QUALCOMM Inc has signed a licensing agreement with the
China-based telecomms equipment provider Huawei Technologies Co Ltd.

Under the royalty-bearing agreement QUALCOMM grants Huawei a licence to develop,
manufacture and sell cdmaOne and 3G CDMA2000 1X/1xEV network equipment based on
QUALCOMM's patented technology and chipsets. Huawei will be able to offer the
equipment both in China and elsewhere.

Financial terms were not revealed.

(C)1994-2001 M2 COMMUNICATIONS LTD m2.com

-0-

(Public Company & Wall Street & Business & High Tech)



To: stockman_scott who wrote (43675)11/5/2001 11:57:49 AM
From: Sully-  Respond to of 65232
 
IT memorandum on CDMA technology signed in Washington

Victor Lupu in Washington

Romanian IT minister Dan Nica and US Trade Secretary Assistant William Lash signed on Wednesday a memorandum on CDMA technology, a document considered by the Romanian side a way to re-launching bilateral relations. ?It is a very modern system with high speed data transmission that will be for the first time implemented in Europe?, says minister Nica. ?CDMA will bring Romania in the first line from the point of view of mobile telephony technologies. The investment will be high, reaching 350 million USD, and it is strongly supported by the American government?, IT minister said for ?Nine O? Clock? Commerce Secretary Donald Evans issued a statement saying he ?fully supports the bilateral partnership through which numerous American companies will benefit?.

The partnership between American Qualcomm from San Diego and the Romanian government for the standardization and implementation of CDMA (Code Division Multiple Access) on wireless technology opens new perspectives for Romania, specialists consider. Romania did not have an agreement with the US in this field and by the opening in 2002 of the telephony market in Romania, the line for competition will be opened. Still the CDMA network will be launched in Romania by Telemobil. Deployment is scheduled for 18 cities in the country and the major routes for later this year. Lucent Technologies of Murray Hill, New Jersey, will be providing CDMA equipment for the first phase of the network. PM Adrian Nastase witnessed the signing ceremony that took place at the US Chamber of Commerce where he delivered a speech on ?Resolute Action to promote business? in front of important managers and officials.

On Thursday important meetings between Romanian and American companies were to take place. Minister Nica says he expects ?as many contracts as possible?. He considers that?s the basis for developing economic relations. ?We strongly support such contacts for their positive consequences, economically and also by stopping brain draining. The more contracts we have the better?, Nica said.



To: stockman_scott who wrote (43675)11/5/2001 5:31:47 PM
From: Sully-  Respond to of 65232
 
Pak considering shifting N-arsenal to China

LONDON, NOVEMBER 4: PAKISTAN is under pressure to move all or part of its nuclear weapons to China for safekeeping from fundamentalists and it is apprehensive of pre-emptive strikes on its nuclear sites by America, India or Israel to prevent the weapons falling into fundamentalist hands, media report said today quoting Pakistani sources.

The threat to weapons widely regarded as the Pakistan military?s ??crown jewels?? has forced Islamabad ??to consider removing warheads to China, Pakistan?s closest strategic ally in the region,?? the Sunday Times reported.

The prospect that loose warheads might be loaded onto helicopters or moved around a region foaming with fundamentalist turmoil is adding to fears in Washington that the war in Afghanistan might provoke a nuclear crisis.

According to the report, Abdul Sattar, the Pakistani Foreign Minister, insisted last week the arsenal was secure. But Washington officials have expressed mounting alarm that any coup attempt against General Pervez Musharraf, the military President, might put Pakistan?s nuclear arsenal at risk.

Pakistani generals were appalled by one authoritative American report last week that an elite Pentagon undercover unit, trained to disarm nuclear weapons, was exploring plans for a mission inside Pakistan. (PTI)

indian-express.com