Sentences with phrase «number of securities based»

That style of factor investing has nothing to do with buying a small number of securities based on value investing as an analytical bottoms - up style based on the characteristics of that particular business.

Not exact matches

Fortune ran numbers to calculate how much extra revenue the U.S. would need to raise, over the next decade, if it lowered the rate of growth in Social Security by one percentage point, reduced increases in Medicare, Medicaid, and other health care spending by a proportional amount, and held discretionary spending below growth in GDP (albeit from the higher base established by the new laws).
«Oftentimes the company will just have an answering machine in human resources with a dedicated phone number, but 90 percent of the time it's ineffective and employees don't use it,» says George Ramos, a managing partner and senior executive investigator at Diversified Risk Management (DRM), a Downey, California - based firm that handles corporate security and investigations.
«In order to trade securities, they need to be a broker - dealer,» said Jerry Brito, executive director at Coin Center, a digital currency advocacy group based in Washington, D.C. «I could imagine [Coinbase] could sell a number of other tokens» with the license.
Actual results, including with respect to our targets and prospects, could differ materially due to a number of factors, including the risk that we may not obtain sufficient orders to achieve our targeted revenues; price competition in key markets; the risk that we or our channel partners are not able to develop and expand customer bases and accurately anticipate demand from end customers, which can result in increased inventory and reduced orders as we experience wide fluctuations in supply and demand; the risk that our commercial Lighting Products results will continue to suffer if new issues arise regarding issues related to product quality for this business; the risk that we may experience production difficulties that preclude us from shipping sufficient quantities to meet customer orders or that result in higher production costs and lower margins; our ability to lower costs; the risk that our results will suffer if we are unable to balance fluctuations in customer demand and capacity, including bringing on additional capacity on a timely basis to meet customer demand; the risk that longer manufacturing lead times may cause customers to fulfill their orders with a competitor's products instead; the risk that the economic and political uncertainty caused by the proposed tariffs by the United States on Chinese goods, and any corresponding Chinese tariffs in response, may negatively impact demand for our products; product mix; risks associated with the ramp - up of production of our new products, and our entry into new business channels different from those in which we have historically operated; the risk that customers do not maintain their favorable perception of our brand and products, resulting in lower demand for our products; the risk that our products fail to perform or fail to meet customer requirements or expectations, resulting in significant additional costs, including costs associated with warranty returns or the potential recall of our products; ongoing uncertainty in global economic conditions, infrastructure development or customer demand that could negatively affect product demand, collectability of receivables and other related matters as consumers and businesses may defer purchases or payments, or default on payments; risks resulting from the concentration of our business among few customers, including the risk that customers may reduce or cancel orders or fail to honor purchase commitments; the risk that we are not able to enter into acceptable contractual arrangements with the significant customers of the acquired Infineon RF Power business or otherwise not fully realize anticipated benefits of the transaction; the risk that retail customers may alter promotional pricing, increase promotion of a competitor's products over our products or reduce their inventory levels, all of which could negatively affect product demand; the risk that our investments may experience periods of significant stock price volatility causing us to recognize fair value losses on our investment; the risk posed by managing an increasingly complex supply chain that has the ability to supply a sufficient quantity of raw materials, subsystems and finished products with the required specifications and quality; the risk we may be required to record a significant charge to earnings if our goodwill or amortizable assets become impaired; risks relating to confidential information theft or misuse, including through cyber-attacks or cyber intrusion; our ability to complete development and commercialization of products under development, such as our pipeline of Wolfspeed products, improved LED chips, LED components, and LED lighting products risks related to our multi-year warranty periods for LED lighting products; risks associated with acquisitions, divestitures, joint ventures or investments generally; the rapid development of new technology and competing products that may impair demand or render our products obsolete; the potential lack of customer acceptance for our products; risks associated with ongoing litigation; and other factors discussed in our filings with the Securities and Exchange Commission (SEC), including our report on Form 10 - K for the fiscal year ended June 25, 2017, and subsequent reports filed with the SEC.
But they have many of the same valuable customer assets, like credit card numbers and e-mail addresses, just on a smaller scale,» says Adam Ely, co-founder and COO of San Francisco - based mobile data security vendor Bluebox Ssecurity vendor Bluebox SecuritySecurity.
Equifax in September announced that 143 million of its US - based users — about half of all of the people in the country — had their personal information compromised from mid-May through July 2017, including Social Security numbers, birthdates, addresses, and other data.
Demonstrate a capability to bid on a consistent basis for its pro rata share of auctions of Treasury securities, based on the number of primary dealers at the time of the auction.
The order weighs how to make the country's immigration program «more merit based,» calls for site visits at companies that employ foreign workers, and tasks the Department of Homeland Security with producing a report twice a year on the total number of foreign - born people — not just nonimmigrant visa holders — who are authorized to work in the United States.
New York - based fintech company R3 announced back in 2015 that it had created a consortium with a number of banks to investigate blockchain use cases around securities settlement and payments.
Bottom Up Estimate: The aggregate expected earnings per share number based on the forecasts of security analysts.
With both security types, the per - share dollar amount of the fund is based on the total value of all the securities in its portfolio, any liabilities the fund has and the number of fund shares outstanding.
Before that in 2016, many Wells Fargo California branch based employees were convicted of selling private customer information (such as Social Security numbers) to an identity thief ring.
The number of attachment figures says nothing about the quality of those attachments, so there was no reason to hypothesize more security among single people, while there was reason, based on attachment theory, to hypothesize more avoidance among single people, seeing as people high on avoidance «avoid intimacy».
The Correctional Association of NY released a report, based largely on the accounts of anonymous inmates, leveling a number of abuse claims against staff at the maximum - security facility that allegedly occurred in the wake of the escape.
The new work represents a key advancement on the path to incorporating quantum - based random number generators — delivering the highest quality numbers and thus the highest level of security — into computers, tablets and mobile phones.
Typically the first three digits of a Social Security number, the «area number,» are based on the zip code of the person's birthplace; the next two, the «group number,» are assigned in a predetermined order within a particular area - number group; and the final four, the «serial number,» are assigned consecutively within each group number.
Unemployment figures were based on counting the number of people who received social security benefits.
In order to create an online security system better prepared for future demands, Hamlin and retired mathematics professor William Webb created the Generalized Knapsack Code in 2015 by retrofitting a previous version of the code with alternative number representations that go beyond the standard binary and base 10 sequences today's computer use to operate.
In an effort to block emerging threats to online security, researchers at princeton university have developed a method to verify the strength of random number generators that form the basis of most encryption systems.
The Human Security Report project brings forth the argument that while «the average number of battle deaths per conflict in the region has declined by 90 percent since 2000» across the Sub-Saharan Africa, nearly half of the world's state - based battle deaths between 1989 and 2009 were caused by wars in sub-Saharan Africa, most of them in the 1990s» (2012:163).
Several school officials reported difficulties conducting school activities such as open houses and sporting events because each base had a limit on the number of security passes for civilians.»
PID errors are usually generated when one or more of the following characteristics do not match the PEIMS PID data base: student ID [either a social security number or state identification number], last name, first name, or date of birth.
Thus, the highest number of points — 138 of the 500 - point scale that Duncan and his staff created for the Race — would be awarded based on a commitment to eliminate what teachers» union leaders consider the most important protections enjoyed by their members: seniority - based compensation and permanent job security.
2013 Lincoln MKX Base - $ 21,998 Memorized Settings Includes Driver Seat, Memorized Settings Number Of Drivers: 2, Phone Voice Activated, Stability Control, Electronic Messaging Assistance With Read Function, Parking Sensors Rear, Touch - Sensitive Controls, Security Remote Anti-Theft Alarm...
2013 Lincoln MKX Base - $ 21,9986 Cylinder, Memorized Settings Includes Driver Seat, Memorized Settings Number Of Drivers: 2, Phone Voice Activated, Stability Control, Electronic Messaging Assistance With Read Function, Parking Sensors Rear, Touch - Sensitive Controls, Security Remote Anti...
Options Included: Premium Package, Preferred Package, 6 Speakers, AM / FM Radio, CD Player, Etr AM / FM Stereo W / Cd Player, Weather Band Radio, Air Conditioning, Rear Window Defroster, Power Steering, Remote Keyless Entry, Black Rooftop Luggage Crossbars, Four Wheel Independent Suspension, Speed - Sensing Steering, ABS Brakes, Dual Front Impact Airbags, Front Anti-Roll Bar, Rear Anti-Roll Bar, Tilt - Sliding Sunroof With Express - Open, Front Fog Lights, Fully Automatic Headlights, Sequential Multi-Point Fuel Injection, Panic Alarm, Security System, Electronic Cruise Control W / Set & Resume Speed, Number Of Valves: 12, Bodyside Moldings, Bumpers: Body - Color, Power Door Mirrors, Roof Rack: Rails Only, Spoiler, Auto - Dimming Inside Rear - View Mirror, Driver Door Bin, Driver Vanity Mirror, Front Cupholders, Illuminated Entry, Leather - Wrapped Steering Wheel, Passenger Vanity Mirror, Steering Wheel Mounted Radio Controls, Tilt Steering Wheel, 6 - Way Power Driver Seat Adjuster, Base Cloth Seat Trim, Driver & Front Passenger Heated Seats, Front Bucket Seats, Front Reclining Bucket Seats, Split Folding Rear Seat, Front Center Armrest W / Storage, Passenger Door Bin, 16» X 6.5» Cast Aluminum Wheels, Deep Tinted Glass, Rear Window Wiper, Variably Intermittent Wipers, 2.70 Axle Ratio, Number Of Doors: 4Preferred Package, Premium Package, ETR AM / FM Stereo w / CD Player, Black Rooftop Luggage Crossbars, Tilt - Sliding Sunroof with Express - Open, Electronic Cruise Control w / Set & Resume Speed, Auto - Dimming Inside Rear - View Mirror, Leather - Wrapped Steering Wheel, Steering Wheel Mounted Radio Controls, 6 - Way Power Driver Seat Adjuster, Driver & Front Passenger Heated Seats, and Deep Tinted Glass.
A small number of Discovery II Commercial models were produced by Land Rover Special Vehicles, this time based on the five - door bodyshell but with the windows rendered opaque to give van - like appearance and security.
The device runs Silent OS 2.0, which is based around Android 5.1.1 with a number of modifications designed with security in mind.
A number of significant issues exist for browser - based Reading Systems, however, including cross-domain resource loading restrictions in the browser security model and the potential for inadvertent interaction between script - based interactivity within EPUB 3 content and script - based Reading System implementations.
This commission can vary based on the number of trades you make, the amount of money you have in your brokerage account, and the type of security you are trading.
The massive data breach has also led to a number of high - profile departures at the Atlanta - based consumer credit reporting agency, including its chief executive, chief information officer and chief security officer.
For ETS accounts, commission charges for transactions will be established based on a number of factors such as trading activity, type of security, transaction size, market conditions, and overall relationship.
Then, subtract federal and state taxes that you paid social security taxes and your «Income Protection Allowance» which is based on the size of your household and number in college.
The amount of your benefits depends on the number of years you (or your spouse) worked and the amount of Social Security taxes you paid during your career, which is based on how much you earned each year.
A U.S. resident (based on the days of presence test in the U.S.) who does not qualify for a Social Security Number will need an ITIN to fulfill their U.S. tax reporting requirements.
Here are some of ASIC «s concerns: many AFS license holders appeared to be based overseas, while promoting the security of Australian regulation; a number number of smaller licensed companies that were foreign - owned (or controlled by a foreign firm) showed lack of awareness or understanding of Australian regulations; some of the firms holding ASIC licenses had outsourced key compliance aspects to third parties, some of which were related to the AFS licensees and based overseas (and were subject to little, if any, regulatory oversight in their home jurisdiction).
The index computes the aggregate market value of all of these securities (or components) and then compares this number to the value of the same components on the base date of December 29, 1995.
We recommend preparing for the call by having an account statement for any accounts you may be transferring, the name, address, and social security number of at least one IRA beneficiary (if opening an IRA account), and 20 - 30 minutes, to allow enough time to complete the phone - based onboarding.
Although the military and government security clearances are issued and reviewed based on a number of factors, each case is considered unique.
And with potential cuts to Social Security looming, less money may be available on a monthly basis while the number of people getting their Social Security garnished will most likely increase.
Step 6: Opening Business Tax - ID Credit Card: After a period of time in which the vendor and revolving trade accounts have positive reporting and payment history, we help the business owner apply and receive their first unsecured credit card based on the business's tax ID instead of their personal social security number.
With both security types, the per - share dollar amount of the fund is based on the total value of all the securities in its portfolio, any liabilities the fund has and the number of fund shares outstanding.
SAN DIEGO and ALAMEDA, Calif., June 25, 2009 (GLOBE NEWSWIRE)-- MediciNova, Inc., a biopharmaceutical company that is publicly traded on the Nasdaq Global Market (Nasdaq: MNOV — News) and the Hercules Market of the Osaka Securities Exchange (Code Number: 4875), and Avigen, Inc. (Nasdaq: AVGN — News), a biopharmaceutical company, today announced that they have confirmed their understanding of certain key terms for a proposed acquisition of Avigen by MediciNova that would combine the companies» broad neurological clinical development programs based on ibudilast (Avigen's AV - 411 and MediciNova's MN - 166).
Depending on the contribution amount, market price, and number of selected securities, the program will diversify the allocations based on priority specified during enrollment.
Thorp, the quantitative investor, valued securities on a probabilistic basis and relied on the statistical phenomenon known as «the law of large numbers» — the law states that more observations we make, the closer our sample will be to the population, and hence greater the certainty of our prediction — to construct portfolios of securities that would, in aggregate, outperform the market.
Credit Monitoring monitors the credit file most closely identified with you based on multiple identifying factors such as first, middle and last names, current and former addresses, Social Security number and date of birth.
Included in that number are 52 Transportation Security Administration (TSA) and U.S. Department of Defense dogs examined at Lackland Air Force Base this year.
You will be given an access code number to key into the pad that operates on a twenty four hour basis for your security and privacy once your holiday booking is confirmed and your time of arrival is set.
Once implemented we will not share your name, address, social security number or any other information (your Personal Details) from which there is a reasonable basis to believe your Personal Details could be obtained, to the policyholder or other insured covered under the same policy against whom you have a valid order of protection, without your express consent.
a b c d e f g h i j k l m n o p q r s t u v w x y z