SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Identix (IDNX) -- Ignore unavailable to you. Want to Upgrade?


To: steve who wrote (5778)12/15/1997 10:32:00 PM
From: Night Writer  Read Replies (1) | Respond to of 26039
 
Selected posts for your viewing pleasure. Did I get the right board. Never looked at it before.
NW

Subject: Re: recent visit
Date: Sun, Dec 14, 1997 18:39 EST
From: Hi C 5
Message-id: <19971214233901.SAA08368@ladder02.news.aol.com>

Last friday i went to idx -Sunnyvale unannounced .Told them i am a stock holder and would like to introduce myself.I was introduced to a vice president[manufacturing]..Ibelieve he reads these posts, he at least knows of them.He took me on a tour of both buildings.I saw about 50 units invarious stages of construction.About 25 employees going about their jobs ,no mass production line with prouduct flying out the door.But Gary Cauble did hint there
was pretty good movement this month.Isuggested i would feel better if IDX bought a facial scan co.He didnt think that was necessary. hic5
try this i have no luck gary@garycauble.com

Subject: Re: IDX vs. Lockheed
Date: Sun, Dec 14, 1997 14:39 EST
From: Halkhave
Message-id: <19971214193900.OAA13375@ladder02.news.aol.com>

Lockheed Martin is in the automated fingerprint identification system (AFIS) business; (not to be confused with Printrak whose stock symbol is AFIS and who is also in the afis business.) Lockheed Martin sells a system which includes a mainframe computer where data is stored on many individual's fingerprints. Then, for example, when a latent fingerprint is found at a crime scene, it can be submitted to the afis which can compare it to the huge
number of fingerprints it has on file determine whose fingerprint it is. IDX's law enforcement business is mainly live scan; that is, when a criminal is arrested, his fingerprint is taken digitally and that digital representation of the minutiae of his fingerprint can then be entered into an afis database in case he leaves a latent print at the scene of a crime or he attempts to use an alias during his next arrest. The afis can compare his
fingerprint with the one on file and make a match.
Of course, it is IDX's commercial applications that also have many people excited. First off, IDX has a proprietary algorithm which enables a fingerprint scanned for commercial purposed to be stored in a way that law enforcement cannot idnetify. Second, the possible applications of biometric identification for banking, time and attendance, gate security, internet security, and others suggest a huge potential market which is clearly just in its
infancy. The problem here is that it seems that fingerprint identification will not win out for all applications. We already see face, iris and voice recognition making inroads in the market.
I believe that there will always be a place for fingerprint identification in this market and that Identix is the leader in the field (at least for now). My view is, why not bet on the horse in the lead as long as it appears healthy and IDX appears healthy. It has recently turned the corner to become a profitable company and its revenues increase annually at a healthy clip. It has failed to put much of that increase down to the bottom line so
far, but the economies of scale may just be entering the picture. As their business continues to grow, it is reasonable to assume that a larger portion of the increased revenue will hit the bottom line.
By the way, mine is a very non-technical way of explaining it. Anyone else want to help me out or correct my less than precise description?

FBI is in the process of taking all of its fingerprints and entering them into an afis (I believe Lockheed Martin is the main contractor on that job) This is just the forerunner to all police departments eventually getting to the point where they take their fingerprints by livescan (IDX) and submit them to FBI and SBI. As you know, many police departments, notably NYC and Boston already do this.
-Hal

Subject: IDX TA Dec 12
Date: Sat, Dec 13, 1997 15:15 EST
From: Ztrade
Message-id: <19971213201501.PAA22697@ladder02.news.aol.com>

IDX marketplace assessment 12/12/97
( last TA post Nov 28 )

near-term rank = above average

forcast trading channel trendlines
+ 2wk + 4wk + 6wk
highs 13.6 13.8 14.1
lows 10.9 11.1 11.3

closing price = 10.5
cyclic resistance @ 11.3
lows trendline @ 10.6

buying pressure = average
selling pressure = below average
investors = confident
traders = undecided
intra-day market mood = favorable

IDX remains near-term bullish and is testing the trading
channel lows trendline now. next week should be interesting.
technicals indicate price should hold or even bounce up.
happy holiday season

V.R. , Z TA source: sharesmart.com

read on if you wish to better understand this TA

Statement of fact

Every stock price changes over time, but never in a straight line,
therefore, TA best predicts likely price behavior with trendlines.

Near-term price trend

Near-term price behavior is predicted by the near-term trend

If this trend is bearish, the associated trendline has negative slope
and projects a line for potential highs, each lower than the last.
This trendline predicts a time-dependent resistance area (significant).
If price rises above this trendline, it implies that buying is emotional
(more than usual) and it is a time for caution if you are long.

If this trend is bullish, the associated trendline has positive slope
and projects a line for potential lows, each higher than the last.
This trendline predicts a time-dependent support area (significant).
If price falls below this trendline, it implies that selling is emotional
(more than usual) and it is a time for caution if you are short.

Intermediate/cyclic price trend

A near-term trading channel circumscribes a large range in price.
Price moves within this trading channel in the form of intermediate
rallys and declines of varing strength and duration. These trading cycles
are best described with an intermediate trendline.

If the intermediate trendline is negative (decline), cyclic resistance has
been detected . If this trendline is positive (rally), cyclic support has been
detected.

Cyclic support or resistance is usually weaker, shorter-lived and less
dependable than trading channel support and resistance areas defined
by the primary near-term trading channel high or low trendline. However,
they can, and often do, develop into near-term trend reversals and need
to be watched closely for signs of sharply improving or deteriorating
technical indicators such as buying/selling pressure, trader activity, etc.

Cyclic price swings are better suited to nimble traders than investors
for trading since they could very well be bull bear traps. However, as
mentioned above, a cyclic move can develop strength and the TA may
detect and signal a near-term bottom or top has formed. If this happens,
a new price behavior prediction (trading channel) is generated indicating a
change in the near-term trading pattern has been detected. For example,
a rising bottoms pattern will change to a declining tops pattern or visa versa.

Near-term trading channel

Price always moves within intermediate trading cycles. Significant
rallys and declines which we call price swings are expected. It's
impossible to predict exact price at any point in the future. Therefore,
near-term price behavior is best predicted by defining a trading channel
defined by upper and lower trendlines.

Upper and lower trendlines indicate where resistance / support
areas are predicted to exist. In other words, these are trendlines for
possible near-term price peaks (highs), or price bottoms (lows).

If the trading channel is bearish (declining highs), the upper trendline
is the significant indicator of potential resistance to higher prices while.
the lower trendline shows where intermediate resistance to declining
prices may exist but is not strong and could readilly be penetrated.

If the trading channel is bullish (rising lows), the lower trendline is
the significant indicator of where potential resistance to lower prices
is likely to develop while the upper trendline indicates where intermediate
resistance to rising prices may exist but is not strong and could readilly
be penetrated.

Price usually stays within the near-term trading channel. The high-low
spread of this channel gives you an indication of the potential for price
swings, or in other words volatility, over the near-term.

Remember, these are trendlines, not brick walls. Price sometimes rises
above the the upper or falls below the lower. This often indicates that the
stock is either temporarilly overbought or oversold in the marketplace.

If a breakout to the upside or a breakdown to the low side is detected,
predicted near-term price behavior and trading channel will change.
In a single day of trading, you may see an abrupt reversal in the TA and
the near-term trading channel. This is indicates that the stock has made
a near-term top or bottom so you can modify investment strategy accordingly.

The above is a condensed explanation of info contained in these TA posts.
Hope it helps you interpret and understand the data better.

v.r., Z

Subject: Re: SI: IDX board...Just Lurking
Date: Thu, Dec 11, 1997 21:41 EST
From: Psam 057
Message-id: <19971212024100.VAA10177@ladder02.news.aol.com>

Been long a long, long time. Play small amounts on rises and falls, win some, lose some. I'm a firm believer in IDX, with a target at least two years, possible three from now. From my eye's it's a baby IBM, and I want to be there when it gets there. A lot of things can go wrong, but if they do will deal with them. Asia for one.

Those guy's on SI know there stuff. I enjoy lurking like most IDX'ers. This new guy Chaz is throwing out some good questions. Be interesting to see the results.

Subject: Re: SI: IDX board...Just Lurking
Date: Thu, Dec 11, 1997 15:35 EST
From: KHarrin193
Message-id: <19971211203600.PAA29136@ladder02.news.aol.com>

Psam......Thanks a million for the thread to SI: IDX. Worked like a charm.I'll make sure I don't loose it again. Thanks again.......Ken H. PS: Also hope you are long IDX. I think the CO. and the stock have a great future.

Subject: IDX vs. Lockheed
Date: Wed, Dec 10, 1997 22:59 EST
From: Nanaondnet
Message-id: <19971211040001.XAA24964@ladder01.news.aol.com>

Can someone explain to me the difference between Lockheed's digital biometrics and that of Identix? I think I read that there is a difference and that the two are not really competitors in the same market. If 'the answer has been posted here a lot, please feel free to write directly to me by my email address.

I've influenced a number of people to invest in IDX and am a long term holder of it myself. One of those people saw the ad about Lockheed on TV and asked me about it tonight. I didn't have a detailed answer to give. Thanks for any info you can send.

Subject: Re: SACM
Date: Wed, Dec 10, 1997 15:49 EST
From: Wesley0428
Message-id: <19971210204901.PAA03035@ladder01.news.aol.com>

SAC Technologies' New Biometric Firewall, SACcat(TM) Available Through Rental Program

MINNEAPOLIS, Dec. 10 /PRNewswire/ -- SAC Technologies, Inc. (Nasdaq: SACM) announced today that SACcat(TM), the industry's first real-time identification system for securing individual and network computer workstations, is available through a rental program. System administrators can now enjoy the benefits of biometrically secured workstations, at little cost, through SAC Technologies' SACcat(TM) rental program.

The System's Administrator Controlled Computer Access Terminal, or SACcat(TM), is a simple and cost-effective security tool for biometrically securing individual computer workstations and networks. SACcat(TM) supports Windows, Novell and UNIX environments.

SACcat(TM) represents the Company's first commercial bundling of its core technology with turn-key mainstream applications. The applications consist of Workstation-Logon, which controls who can boot and operate a computer; Screen-Saver-Lockout, which secures a workstation when a user is away from his or her desk; Local-Network-Logon and Remote-Network-Logon, which restrict who has access to a specific network and what applications can be run,
all of which utilize a user's unique fingerprint-based Bio-Key. Future options (available 1998) will provide for the additional ability to selectively encrypt program and data files on a workstation along with node-to-node network communications utilizing a person's unique Bio-Key.

Since the SACcat(TM) system is a real-time identification technology versus other verification or authentication systems, the user can restrict access to his or her information resources without the use of passwords, pin numbers, cards or tokens.

Mr. Don Johnson, Senior Sales Executive for the SACcat(TM) Reseller's Rental Program, stated, "An option of the SACcat(TM) rental program is that it may allow an organization to expense a security solution. For less than thirty-cents a day, a network workstation can be secured, controlled, monitored and audited utilizing state-of-the-art biometric technology. We believe SACcat(TM) will provide a more affordable alternative to existing software
and hardware firewall solutions while providing the additional security of biometric identification."

SAC's Chief Executive Officer, Mr. Barry Wendt, added, "We are targeting Value Added Resellers (VARs), system integrators, and distributors to market the SACcat(TM) program. We believe that by offering this affordable rental program, organizations can experience, first-hand, the benefits of Biometric security controls with minimal financial investment. This rental program makes Biometric technology a viable option for organizations seeking to
enhance the security of their computer workstations and networks."

The SACcat(TM) program is available for immediate installation. For more information regarding SACcat(TM), contact Don Johnson, Senior Sales Executive, at 612-835-7080, or visit SAC's website at www.sacman.com.

Profile SAC Technologies, Inc. provides technology for network and computer security without the use of pin numbers, passwords or tokens.

Safe Harbor Statement Statements contained herein, other than historical data, may be forward-looking and are subject to risks and uncertainties including, but not limited to, the Company's ability to achieve its sales and marketing plans while effectively managing costs and expenses as well as those risks set forth in the Company's Forms 10KSB, 10QSB, and other SEC filings.

For more information on SAC Technologies, dial 800-PRO-INFO, code SACM.

SOURCE SAC Technologies, Inc.

CO: SAC Technologies, Inc.

ST: Minnesota