Click here to close now.


News Feed Item

TMM, Inc. Selects MZ as its Investor Relations Advisor

WILMINGTON, Del., March 17, 2014 /PRNewswire/ -- TMM, Inc. (OTC PNK: TMMI) ("TMM" or "the Company"), today announced that it has retained MZ Group as its investor relations advisor.

MZ Group will assist TMM with investor relations, shareholder communications and investor outreach. MZ will target small and microcap investors interested in the technology sector, particularly high net worth investors and family offices.

Gerard Cavanaugh, Chairman and President of TMM, Inc. stated, "Our patented TRUDEF™ compression technology holds significant potential for a number of exciting applications that address the global demand for better bandwidth utilization. The potential to significantly reduce bandwidth requirements and improve video quality makes TRUDEF™ an ideal candidate to be a disruptive force inDigital Cinema; HDTV; Intelligence, Surveillance and Reconnaissance; gaming and streaming media applications. We are engaged in active discussions with several commercial customers to license our technology."

"TMM is the type of emerging technology company that we enjoy working with," said Ted Haberfield, President of MZ Group North America. "The disruptive nature of TRUDEF™ and the potential to scale quickly across enormous markets through seamless integration of custom engineering with high volume users makes TMM a unique and compelling company. We look forward to introducing this exciting investment opportunity to our network of high net worth and institutional investors."

About TMM, Inc.
TMM, Inc. (Pink Sheet: TMMI) ("TMMI") is a technology company headquartered in Wilmington, Delaware, specializing in digital video compression and image management. Founded in 1990, the company is dedicated to improving bandwidth utilization and video image quality. TMMI develops digital video compression technology that provides end-to-end workflow and distribution solutions for digital cinema; streaming media; cable TV; sports; mobile; intelligence, surveillance and reconnaissance; defense; security; medical imaging; space exploration; gaming and education. For more information, please visit the company's website at

For more information, please visit the Company's Website at

Safe Harbor Statement

The information in this release contains forward-looking statements which involve risks and uncertainties, including statements regarding the Company's capital needs, business strategy and expectations. Any statements contained herein that are not statements of historical fact may be deemed to be forward-looking statements, which may be identified by terminology such as "may," "should," "will," "expect," "plan," "intend," "anticipate," "believe," "estimate," "predict," "potential," "forecast," "project," or "continue," the negative of such terms or other comparable terminology. Readers should not rely on forward-looking statements as predictions of future events or results. Any or all of the Company's forward-looking statements may turn out to be wrong. They can be affected by inaccurate assumptions, risks and uncertainties and other factors which could cause actual events or results to be materially different from those expressed or implied in the forward-looking statements. Factors may cause the Company's actual results to differ materially from any forward-looking statement. In addition, new factors emerge from time to time and it is not possible for the Company to predict all factors that may cause actual results to differ materially from those contained in any forward- looking statements. The Company disclaims any obligation to publicly update any forward-looking statements to reflect events or circumstances after the date of this document, except as required by applicable law.



More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
In their session at DevOps Summit, Asaf Yigal, co-founder and the VP of Product at, and Tomer Levy, co-founder and CEO of, will explore the entire process that they have undergone – through research, benchmarking, implementation, optimization, and customer success – in developing a processing engine that can handle petabytes of data. They will also discuss the requirements of such an engine in terms of scalability, resilience, security, and availability along with how the archi...
In his session at DevOps Summit, Bryan Cantrill, CTO at Joyent, will demonstrate a third path: containers on multi-tenant bare metal that maximizes performance, security, and networking connectivity.
SYS-CON Events announced today that VividCortex, the monitoring solution for the modern data system, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The database is the heart of most applications, but it’s also the part that’s hardest to scale, monitor, and optimize even as it’s growing 50% year over year. VividCortex is the first unified suite of database monitoring tools specifically desi...
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, al...
DevOps has often been described in terms of CAMS: Culture, Automation, Measuring, Sharing. While we’ve seen a lot of focus on the “A” and even on the “M”, there are very few examples of why the “C" is equally important in the DevOps equation. In her session at @DevOps Summit, Lori MacVittie, of F5 Networks, will explore HTTP/1 and HTTP/2 along with Microservices to illustrate why a collaborative culture between Dev, Ops, and the Network is critical to ensuring success.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
The APN DevOps Competency highlights APN Partners who demonstrate deep capabilities delivering continuous integration, continuous delivery, and configuration management. They help customers transform their business to be more efficient and agile by leveraging the AWS platform and DevOps principles.
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...