Page 1,347«..1020..1,3461,3471,3481,349..1,3601,370..»

The UKs Online Safety Bill, explained – The Verge

At some point this year, the UKs long-delayed Online Safety Bill is finally expected to become law. In the governments words, the legislation is an attempt to make the UK the safest place in the world to be online by introducing a range of obligations for how large tech firms should design, operate, and moderate their platforms.

As any self-respecting Verge reader knows, content moderation is never simple. Its difficult for platforms, difficult for regulators, and difficult for lawmakers crafting the rules in the first place. But even by the standards of internet legislation, the Online Safety Bill has had a rocky passage. Its been developed over years during a particularly turbulent era in British politics, changing dramatically from year to year. And as an example of just how controversial the bill has become, some of the worlds biggest online organizations, from WhatsApp to Wikipedia, are preemptively refusing to comply with its potential requirements.

So if youve tuned out the Online Safety Bill over the past few years and lets be honest, a lot of us have its time to brush up. Heres where the bill came from, how its changed, and why lawmakers might be about to finally put it on the books.

So lets start from the beginning. What is the Online Safety Bill?

The UK governments elevator pitch is that the bill is fundamentally an attempt to make the internet safer, particularly for children. It attempts to crack down on illegal content like child sexual abuse material (CSAM) and to minimize the possibility that kids might encounter harmful and age-inappropriate content, including online harassment as well as content that glorifies suicide, self-harm, and eating disorders.

The safest place in the world to be online

But its difficult to TL;DR the Online Safety Bill at this point, precisely because its become so big and sprawling. On top of these broad strokes, the bill has a host of other rules. It requires online platforms to let people filter out objectionable content. It introduces age verification for porn sites. It criminalizes fraudulent ads. It requires sites to consistently enforce their terms of service. And if companies dont comply, they could be fined up to 18 million (around $22.5 million) or 10 percent of global revenue, see their services blocked, and even see their executives jailed.

In short, the Online Safety Bill has become a catchall for UK internet regulation, mutating every time a new prime minister or digital minister has taken up the cause.

How many prime ministers are we talking about here?

Wait, how long has this bill been in the works for?

The Online Safety Bill started with a document called the Online Harms White Paper, which was unveiled way back in April 2019 by then-digital minister Jeremy Wright. The death of Molly Russell by suicide in 2017 brought into sharp relief the dangers of children being able to access content relating to self-harm and suicide online, and other events like the Cambridge Analytica scandal had created the political impetus to do something to regulate big online platforms.

The Online Safety Bill: a timeline

${item.text}

The idea was to introduce a so-called duty of care for big platforms like Facebook similar to how British law asks employers to look after the safety of their employees. This meant companies would have to perform risk assessments and make proactive solutions to the potential harms rather than play whack-a-mole with problems as they crop up. As Carnegie UK associate Maeve Walsh puts it, Interventions could take place in the way accounts are created, the incentives given to content creators, in the way content is spread as well as in the tools made available to users before we got to content take down.

The white paper laid out fines and the potential to block websites that dont comply. At that point, it amounted to some of the broadest and potentially strictest online regulations to have been proposed globally.

What was the response like at the time?

Obviously, there was a healthy amount of skepticism (Wireds take was simply titled All thats wrong with the UKs crusade against online harms), but there were hints of cautious optimism as well. Mozilla, for example, said the overall approach had promising potential, although it warned about several issues that would need to be addressed to avoid infringing on peoples rights.

If the British government was on to such a winner, why hasnt it passed this bill four years later?

Have you paid attention to British politics at all in the past four years? The original white paper was introduced four prime ministers and five digital ministers ago, and it seems to have been forced into the back seat by more urgent matters like leaving the European Union or handling the covid-19 pandemic.

But as its passed through all these hands, the bill has ballooned in size picking up new provisions and sometimes dropping them when theyre too controversial. In 2021, when the first draft of the bill was presented to Parliament, it was just 145 pages long, but by this year, it had almost doubled to 262 pages.

Where did all those extra pages come from?

Given the bills broad ambitions for making online life safer in general, many new elements were added by the time it returned to Parliament in March 2022. In no particular order, these included:

Over time, the bills definition of safety has started to look pretty vague. A provision in the May 2021 draft forbade companies from discriminating against particular political viewpoints and will need to apply protections equally to a range of political opinions, no matter their affiliation, echoing now familiar fears that conservative voices are unfairly censored online. Bloomberg called this an anti-censorship clause at the time, and it continues to be present in the 2023 version of the bill.

And last November, ministers were promising to add even more offenses to the bill, including downblousing and the creation of nonconsensual deepfake pornography.

Hold up. Why does this pornography age check sound so familiar?

The Conservative Party has been trying to make it happen since well before the Online Safety Bill. Age verification was a planned part of the Digital Economy Bill in 2016 and then was supposed to happen in 2019 before being delayed and abandoned in favor of rolling the requirements into the Online Safety Bill.

The problem is, its very difficult to come up with an age verification system that cant be either easily circumvented in minutes or create the risk that someones most intimate web browsing moments could be linked to their real-life identity notwithstanding a plan to let users buy a porn pass from a local shop.

Age checks for porn are a long-running political project

And its not clear how the Online Safety Bill will overcome this challenge. An explainer by The Guardian notes that Ofcom will issue codes of practice on how to determine users ages, with possible solutions involving having age verification companies check official IDs or bank statements.

Regardless of the difficulties, the government is pushing ahead with the age verification requirements, which is more than can be said for its proposed rules around legal but harmful content.

And what exactly were these legal but harmful rules?

Well, they were one of the most controversial additions to the entire bill so much so that theyve been (at least partially) walked back.

Originally, the government said it should officially designate certain content as harmful to adults but not necessarily illegal things like bullying or content relating to eating disorders. (Its the less catchy cousin of lawful but awful.) Companies wouldnt necessarily have to remove this content, but theyd have to do risk assessments about the harm it might pose and set out clearly in their terms of service how they plan to tackle it.

But critics were wary of letting the state define what counts as harmful, the fear being that ministers would have the power to censor what people could say online. At a certain point, if the government is formally pushing companies to police legal speech, its debatable how legal that speech still is.

From legal but harmful to the triple shield

This criticism had an effect. The legal but harmful provisions for adults were removed from the bill in late 2022 and so was a harmful communications offense that covered sending messages that caused serious distress, something critics feared could similarly criminalize offensive but legal speech.

Instead, the government introduced a triple shield covering content meant for adults. The first shield rule says platforms must remove illegal content like fraud or death threats. The second says anything that breaches a websites terms of service should be moderated. And the third says adult users should be offered filters to control the content they see.

The thinking here is that most websites already restrict harmful communications and legal but harmful content, so if theyre told to apply their terms of service consistently, the problem (theoretically) takes care of itself. Conversely, platforms are actively prohibited from restricting content that doesnt breach the terms of service or break the law. Meanwhile, the filters are supposed to let adults decide whether to block objectionable content like racism, antisemitism, or misogyny. The bill also tells sites to let people block unverified users aka those pesky anonymous trolls.

None of this impacts the rules aimed specifically at children in those cases, platforms will still have a duty to mitigate the impact of legal but harmful content.

Im glad that the government addressed those problems, leaving a completely uncontroversial bill in its wake.

Wait, sorry. Were just getting to the part where the UK might lose encrypted messaging apps.

Remember WhatsApp? After the Online Safety Bill was introduced, it took issue with a section that asks online tech companies to use accredited technology to identify child sexual abuse content whether communicated publicly or privately. Since personal WhatsApp messages are end-to-end encrypted, not even the company itself can see their contents. Asking it to be able to identify CSAM, it says, would inevitably compromise this end-to-end encryption.

WhatsApp is owned by Meta, which is persona non grata among regulators these days, but its not the only encrypted messaging service whose operators are concerned. WhatsApp head Will Cathcart wrote an open letter that was co-signed by the heads of six other messaging apps, including Signal. If implemented as written, [this bill] could empower Ofcom to try to force the proactive scanning of private messages on end-to-end encrypted communication services - nullifying the purpose of end-to-end encryption as a result and compromising the privacy of all users, says the letter. In short, the bill poses an unprecedented threat to the privacy, safety and security of every UK citizen and the people with whom they communicate.

The consensus among legal and cybersecurity experts is that the only way to monitor for CSAM while leaving messages encrypted in transit is to use some kind of client-side scanning, similar to the approach Apple announced in 2021 that it would be using for image uploads to iCloud. But the company ditched the plans the following year amid widespread criticism from privacy advocates.

In its open letter, WhatsApp argues that regardless of whether a scanning technology still means messages are technically encrypted in transit, it still fatally undermines end-to-end encryption. Proponents say that they appreciate the importance of encryption and privacy while also claiming that its possible to surveil everyones messages without undermining end-to-end encryption, the letter says. The truth is that this is not possible.

Organizations such as the Internet Society say that such scanning risks creating vulnerabilities for criminals and other attackers to exploit and that it could eventually lead to the monitoring of other kinds of speech. The government disagrees and says the bill does not represent a ban on end-to-end encryption, nor will it require services to weaken encryption. But without an existing model for how such monitoring can coexist with end-to-end encryption, its hard to see how the law could satisfy critics.

The UK government already has the power to demand that services remove encryption thanks to a 2016 piece of legislation called the Investigatory Powers Act. But The Guardian notes that WhatsApp has never received a request to do so. At least one commentator thinks the same could happen with the Online Safety Bill, effectively giving Ofcom a radical new power that it may never choose to wield.

But that hasnt exactly satisfied WhatsApp, which has suggested it would rather leave the UK than comply with the bill.

Okay, so messaging apps arent a fan. What do other companies and campaigners have to say about the bill?

Privacy activists have also been fiercely critical of what they see as an attack on end-to-end encryption. The Electronic Frontier Foundation, Big Brother Watch, and Article 19 published an analysis earlier this year that said the only way to identify and remove child sexual exploitation and abuse material would be to monitor all private communications, undermining users privacy rights and freedom of expression. Similar objections were raised in another open letter last year signed by 70 organizations, cybersecurity experts, and elected officials. The Electronic Frontier Foundation has called the bill a blueprint for repression around the world.

Tech giants like Google and Meta have also raised numerous concerns with the bill. Google says there are practical challenges to distinguishing between illegal and legal content at scale and that this could lead to the over-removal of legal content. Meta suggests that focusing on having users verify their identities risks excluding anyone who doesnt wish to share their identity from participating in online conversations.

A blueprint for repression around the world

Even beyond that, there are more fundamental concerns about the bill. Matthew Lesh, head of public policy at the Institute of Economic Affairs, notes that theres simply a massive disparity between what is acceptable for children to encounter online and whats acceptable for adults under the bill. So you either risk the privacy and data protection concerns of asking all users to verify their age or you moderate to a childrens standard by default for everyone.

That could put even a relatively safe and educational service like Wikipedia under pressure to ask for the ages of its users, which the Wikimedia Foundations Rebecca MacKinnon says would violate [its] commitment to collect minimal data about readers and contributors.

The Wikimedia Foundation will not be verifying the age of UK readers or contributors, MacKinnon wrote.

Okay, thats a lot of criticism. So whos in favor of this bill?

One group thats been broadly supportive of the bill is childrens charities. The National Society for the Prevention of Cruelty to Children (NSPCC), for example, has called the Online Safety Bill an urgent and necessary child protection measure to tackle grooming and child sexual abuse online. It calls the legislation workable and well-designed and likes that it aims to tackle the drivers of online harms rather than seek to remove individual pieces of content. Barnardos, another childrens charity, has been supportive of the bills introduction of age verification for pornography sites.

Ian Russell, the father of the late Molly Russell, has called the Online Safety Bill a really important piece of legislation, though hes pushed for it to go further when it comes to criminal sanctions for executives whose products are found to have endangered childrens well-being.

I dont think that without effective regulation the tech industry is going to put its house in order, to prevent tragedies like Mollys from happening again, Russell said. This sentiment appears to be shared by increasing numbers of lawmakers internationally, such as those in California who passed the Age-Appropriate Design Code Act in August last year.

Wheres the bill at these days?

As of this writing, the bill is currently working its way through the UKs upper chamber, the House of Lords, after which itll be passed back to the House of Commons to consider any amendments that have been made. The governments hope is to pass it at some point this summer.

Even after the bill passes, however, there will still be practical decisions made about how itll work in practice. Ofcom will need to decide what services pose a high enough risk to be covered by the bills strictest rules and develop codes of practice for platforms to abide by, including tackling thorny issues like how to introduce age verification for pornography sites. Only after the regulator completes this consultation process will companies know when and how to fully comply with the bill, and Ofcom has said it expects this to take months.

The Online Safety Bill has had a difficult journey through Parliament, and its likely to be months before we know how its most controversial aspects are going to work (or not) in practice.

Update May 4th, 11:15AM ET:Updated to add more details about the objections to client-side scanning.

Original post:
The UKs Online Safety Bill, explained - The Verge

Read More..

What Is Application Security and Why Do You Need It? – MUO – MakeUseOf

Staying safe online can be a slippery slope. Even if you understand cybercriminals' gimmicks, you could make a simple mistake and suffer severe consequences. It helps to secure your applications and protect your data in unfavorable circumstances.

Application security sets precedence to mitigate cyber threats and vulnerabilities before they occur. How does it do this and what benefits does it offer?

Application security is the implementation of policies, procedures, and processes to secure your software and hardware applications to prevent internal and external threats. It begins from the app's development stage and runs through its lifespan.

Application security uses a standard checklist containing security protocols of acceptable practices within an application. Prohibited activities and devices are blacklisted from entering or operating within the application.

There are various types of application security such as web application security, cloud application security, and mobile application security.

Web applications are software and services you use on a browser with an internet connection. Since the data is transmitted via the remote servers of an internet connection, web applications are vulnerable to all kinds of attacks.

Web application security is a method for securing data on your website by blocking its endpoints against unauthorized access. Effective web application security prevents downtime. Even when your application is under attack, it still functions without jeopardizing the user experience.

Cloud technology allows you to use multiple tools and services to store and access your data for optimal operations without building and managing these services yourself. Since you'd usually share cloud applications with others, the cloud services have numerous access points that hackers can leverage.

Cloud application security instills policies and processes to secure active services in the cloud and its host systems. Attacks on cloud applications are usually severe because they impact multiple networks on the service.

Mobile applications are very popular among individuals. You probably have several applications you use regularly on your smartphone. Using these tools without security is a recipe for disaster as intruders seek illegitimate ways to retrieve your data.

Mobile application security offers multiple security layers to protect your applications from intrusions. It begins with restricting access to only authorized users and then blocks third-party networks from intercepting your connection to retrieve your data.

Application security implements various security controls to verify users identities as they engage with your system. Malicious and illegitimate users fail the verification processes and are unable to proceed.

Here are some application security techniques:

Encryption is the process of transforming plain data into a coded format, so users can only view or understand it after they decrypt it. This is an essential part of application security because threat actors could use advanced hacking techniques such as brute force to enter your network and see your data. But when you encrypt your data, its of no use to them so far they cant decrypt it.

In data encryption, the sender and receiver of the data assign cryptographic keys to the information they are protecting. The receiver can easily decrypt the data since they have the keys.

Authentication is a standard procedure for verifying the legitimacy of a user trying to access your application. A common application security method, a user needs to enter the username and password they generated when signing up to your system to access their account. The system runs a background check to confirm that the login credentials are authentic.

Hackers have gotten better at bypassing the standard username and password single authentication, so you need to implement stronger methods like multi-factor authentication that add additional security layers. Besides entering their username and password, a user may need to provide a one-time password (OTP) your system generates and sends to their phone or email.

Authorization works in line with authentication. Its the process of running a users credentials through the list of legitimate users and confirming whether they are on the list. Authorization allows for more streamlined access control. It verifies a users access privilege to specific areas of your system.

A user passing the authentication shouldnt automatically grant them access to all the resources in your system, especially when you have sensitive data. To access delicate resources, they need to undergo an authorization pass.

All systems are vulnerable by defaultthis explains why there are residual and inherent risks. Application security checkmates existing and potential risks and ultimately enhances your system in the following ways.

Phishing attacks where threat actors trick people into compromising their data or system happen daily. Some victims may have a high level of cybersecurity awareness but still fall for these antics because no one is infallible. Its important that you have default security settings that are independent of users actions.

Application security focuses on securing active applications. It considers various possible threats that may occur on the system and erects defenses to push back. For instance, an email security system can detect malicious emails and send them to spam without allowing you to see them in the first place. Some tools will block harmful links and attachments from opening even when you click on them.

One major reason anyone, especially cybercriminals, would want to hack your system is so they can access your data. They wouldnt waste their time plotting an attack on your system if you didnt have valuable data.

Application security helps you build security walls around your application. And if intruders manage to bypass those walls, it also secures your data with techniques like encryption, so they cant view or read your data. This privacy prevents sensitive data exposure and ransomware attacks.

One would think that the biggest networks would be the most secure, but they have come under attack, exposing users data. You don't earn user trust and confidence with the size of your network, but by proving to them that they are safe on your platform.

If you have been using a particular platform for a while, and you havent experienced any form of breach or attack, you would develop some level of trust and confidence in it.

Application security offers a level-playing field of security. No matter how big or small your system is, you can protect yourself and other users by implementing the available application security measures within your environment.

To get the most out of application security, you must test it regularly to ensure it functions effectively. This is key as little changes on your system can alter its operations.

Application security offers additional security layers beyond what you have on the ground in your network, ensuring that each application doesn't harbor vulnerabilities. This helps to identify and resolve specific threats on time.

More here:
What Is Application Security and Why Do You Need It? - MUO - MakeUseOf

Read More..

5 TB WD My Passport portable HDD gets a solid 28% discount on … – Notebookcheck.net

WD My Passport portable HDD (Source: Western Digital)

Available on Amazon since late August 2019, the WD My Passport (WDBPKJ0050BBK-WESN) is a 5 TB USB 3.0 portable hard drive that comes with 256-bit hardware encryption and a backup software solution (download needed). The ongoing 28% discount takes this piece of hardware from US$149.99 to US$107.99.

Although cloud backups and portable SSDs are cost-effective and easy to acquire, some old-school portable HDDs are still hanging around. The 2.5-inchWD My Passport is one of the most popular portable external hard drives on Amazon, with no less than 80,139 user reviews and 953 answered questions posted in less than 4 years. Now, the top-of-the-line 5 TB model in black, labeled WDBPKJ0050BBK-WESN, is down from US$149.99 to US$107.99 on Amazon, thanks to a 28% discount.

The WD My Passport features a slim design and provides 256-bit AES hardware encryption. It can be connected to a wide range of devices via a5 Gbps SuperSpeed USB 3.0(PDF reference guide)port for best performance, but is also compatible with USB 2.0. The 5 TB model mentioned above measures 4.22 X 2.95 X 0.75 inches and weighs 0.46 pounds. The entire My Passport lineup is compatible with Windows 10, macOS, and ChromeOS. However, Acronis True Image for Western Digital and the other software companions provided for free to the users of this drive only work with Windows and macOS.

While the My Passport family is rated only 3.1/5 after 224 validated user reviews on Western Digital's website, the feedback provided by Amazon users is much better. The 4.6/5 general rating is the result of 80% 5-star reviews, 11% 4/5 assessments, and 5% minimum scores. The breakdown by feature highlights this drive's reduced weight (4.6), storage capacity and portability (4.4), ease of use (4.1), value for money (4.0), and tech support (3.5).

Covered by a 3-year limited warrantly, the WD My Passport currently comes alongside 90 days of Amazon Music Unlimited. However, this offer only applies to new subscribers.

Buy the WD My Passport (WDBPKJ0050BBK-WESN) on Amazon

Disclaimer: Notebookcheck is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability.

Amazon (see affiliate link at the end of the article)

Top 10 LaptopsMultimedia, Budget Multimedia, Gaming, Budget Gaming, Lightweight Gaming, Business, Budget Office, Workstation, Subnotebooks, Ultrabooks, Chromebooks

under 300 USD/Euros, under 500 USD/Euros, 1,000 USD/Euros, for University Students,Best Displays

Top 10 SmartphonesSmartphones, Phablets, 6-inch,Camera Smartphones

In my early school days, I hated writing and having to make up stories. A decade later, I started to enjoy it. Since then, I published a few offline articles and then I moved to the online space, where I contributed to major websites that are still present online as of 2021 such as Softpedia, Brothersoft, Download3000, but I also wrote for multiple blogs that have disappeared over the years. I've been riding with the Notebookcheck crew since 2013 and I am not planning to leave it anytime soon. In love with good mechanical keyboards, vinyl and tape sound, but also smartphones, streaming services, and digital art.

Please share our article, every link counts!

.170

More here:
5 TB WD My Passport portable HDD gets a solid 28% discount on ... - Notebookcheck.net

Read More..

Adult Vaccinations and Decentralization of Health Care: How to … – Pharmacy Times

Were all familiar with the numerous vaccinations recommended by the CDC for children aged from birth to 6 years of age, most of which are required prior to entering school for the first time.1 Yet now, the landscape of adult vaccinations has become just as full and complex. With multiple vaccines recommended for older adults, patients and physicians are now faced with the complicated decisions of which ones to receive when, and whether certain vaccines should be prioritized.

Credit: Aron M - Austria - stock.adobe.com

On top of navigating these questions, keeping accurate record of when and where patients receive vaccines can be a challenge for both patients and providers. Despite this complex picture, there are certain steps that can be taken to ensure that all adults remain healthy.

The landscape of adult vaccinations

There are 5 vaccines that are currently recommended for adults ages 65 and older: influenza, pneumonia, shingles, COVID-19, and tetanus, diphtheria, and pertussis (Tdap).2 Additionally, GSKs respiratory syncytial virus (RSV) vaccine was recently approved and Pfizers will likely receive approval once evaluated by the FDA.

Of course, patients cant receive all 6 of these vaccines at once. When deciding which ones to receive first, patients and their physicians must consider the patients conditions and health history. For example, a patient with a respiratory illness such as COPD should prioritize getting vaccinated for pneumonia and COVID-19 because they would likely have greater complications from these diseases as opposed to shingles or tetanus.

On a more general level, getting vaccinated is especially important for older adults with any chronic health conditions because vaccines can prevent serious illness and resulting complications down the road. Despite this, vaccine hesitancy remains a major barrier to widespread vaccination. As we know, this issue came into the spotlight during the rollout of COVID-19 vaccines, which received much negative press during the height of the pandemic.

Vaccine hesitancy persists today. During the pandemic, many people developed negative feelings toward vaccines in general, as they felt they were forced to be vaccinated against COVID-19 rather than actively choosing to be vaccinated. Many patients are also experiencing vaccine fatigue after multiple doses of the vaccine and its corresponding boosters.

Because of these lingering trends, were likely to see some adults avoid any additional vaccines and thus not become fully vaccinated against all diseases. Unfortunately, this will lead to some patients developing serious illness, and potentially dying, due to a vaccine-preventable disease, which happens to thousands of patients every year.3

For those who choose to become fully vaccinated, most of the applicable vaccines are easily accessible at a variety of different venues from physicians offices and walk-in clinics to drugstores and even supermarkets. However, this creates the issue of keeping track of when and where patients receive different vaccines. There may not be communication between these different venues, and there is no centralized record system in the United States for adult immunizations.

When children are vaccinated, they receive physical vaccine records that are required for entry into many schools and other forms of childcare. Although no such system currently exists for adult vaccinations, keeping record is no less important for older adults. In fact, many adults are not immunized to the extent recommended by physicians, in part because they do not have a way to keep track of them.

We need a centralized, digital record system for immunizationsno matter the patients age. These virtual records are something the patient, not their health system or the payer, should own. And, ideally, the patient should carry the record around like a passport, so all providers can see a patients vaccine history in any setting.

The availability of vaccines at a variety of venues and the lack of a unified record system is indicative of a larger trend in the health care industry: decentralization. Forty or 50 years ago, the US health care system was highly decentralized, with many patients receiving care at physician-owned practices and independent pharmacies.

Over the past several decades, however, health care delivery has evolved to a largely centralized, hospital system-based model. The intention was to improve operational efficiency, increase revenue, and create a better patient experience.

In reality, for many patients, centralization has actually decreased ease of access and convenience when seeking care. Although local, community-based options still exist, patients are now encouraged to seek care at larger hospitals that may be farther away. As a result, care has become less personalized, and patients are often treated simply as numbers.

With the evolving landscape and the increased availability of vaccines, were seeing a shift back toward decentralization. Now, fewer patients are turning to health systems and more patients are receiving care in other venues, such as clinics and even at home.

Decentralization, if done correctly, will bring convenience back to health care, and patients stand to benefit immensely from this improved access. We need to bring back more personal medicine at independently owned practices so patients can be treated in their own communities and home-based settings.

We also need to further leverage technology, including creating digital vaccine records as described earlier and putting them into widespread use. Personal digital health tools already exist just think about the many apps already available for tracking blood sugar, weight, and nutrition. Patients want to be able to manage their own health care, and we already have the technology that enables them to take better control. If we can maximize the potential of these tools and develop new solutions where needed, we can enable patients to take full ownership of their care journey.

The current landscape of adult vaccinations is complex, but patients and physicians can work together to navigate it. By making informed decisions around vaccines and leveraging technology to allow patients to take back control of their care, we can ensure that all individuals remain safe, happy, and healthy.

About the Author

Jayne Hornung is chief clinical officer at MMIT (Managed Markets Insight & Technology).

References

Read more:

Adult Vaccinations and Decentralization of Health Care: How to ... - Pharmacy Times

Read More..

SEC crackdown on crypto staking in the US could boost decentralization – Cointelegraph

The Ethereum network underwent the successful Shapella hard fork on April 12, allowing validators to withdraw their long-staked Ether (ETH) from the Beacon Chain after three years. In the first week of withdrawals, more than a million ETH was unstaked by validators.

However, from the second week onward, the number of ETH staked was higher than that of ETH withdrawn, indicating that validators are re-staking most of their ETH back into mining pools.

Staking is temporarily locking tokens on a network that uses a proof-of-stake (PoS) consensus mechanism. In a PoS network like Ethereum, users who wish to support the blockchain by validating new transactions and adding new blocks must stake a certain amount of cryptocurrency. In return, they receive rewards.

Staking ensures that a blockchain is only updated with valid data and transactions. Participants wanting to increase their chances of validating new transactions offer to stake large amounts of cryptocurrency as insurance.

Ether being re-staked is a big positive for the Ethereum network, but its future in the United States remains uncertain. Ethereum staking is getting tricky for many U.S.-based validators as staking service providers, particularly centralized exchanges, are fighting a regulatory battle with the Securities and Exchange Commission (SEC).

In February, Kraken crypto exchange settled with the SEC for $30 million and closed its staking services for U.S clients. The SEC claimed that the service qualified as a security and that Kraken must obtain the necessary license to operate.

Kraken withdrew its validator nodes for U.S. clients just a day before the Shapella upgrade to comply with SEC orders. The shutdown triggered an industry-wide debate on the future of staking services in the United States. Coinbase one of the first crypto exchanges to go public in the U.S. also provides staking services and is trying to force the SEC to answer a petition it filed regarding guidance for cryptocurrencies.

Coinbase CEO Brian Armstrong claimed that the SECs efforts to curtail staking service providers would prohibit retail staking in the United States. This might force many crypto platforms and staking service providers to move to offshore locations. At a time when the SEC is proactive in its enforcement action against crypto-staking services, the future of ETH staking looks shaky in the United States.

Magazine:Whatever happened to EOS? Community shoots for unlikely comeback

Stephenie Lord Eisert, senior director of law enforcement at crypto intelligence firm Merkel Science, told Cointelegraph that cryptocurrencies are a global entity. Thus, a clampdown by one particular jurisdiction would only force service providers to move elsewhere.

The proposed ban on crypto staking will not protect investors from fraud or scams. Instead, it will create a regulatory void that will be exploited by bad actors. Rather than banning centralized staking providers, regulators should focus on addressing the lack of guidance around both centralized and decentralized staking options, she said.

The U.S. is home to the majority of node operators on the Ethereum blockchain. Of the 9,849 active nodes, 5,214 are in the U.S., followed by 1,679 in Germany and 277 in Japan. The latest data from Etherscan indicates that node operators in the U.S. declined by 20% in the past week.

William Kraus, a partner at FisherBroyles law firm, told Cointelegraph that the SECs enforcement against Kraken shows the commissions position on staking-as-a-service.

He added that this could prompt U.S. providers to respond in several ways, with some eliminating the service altogether, while others might implement changes to how they provide the service or publicly describe it. Some providers might decide not to change anything. However, the settlement has lessened ambiguity about staking, and providers must carefully consider the SECs position going forward, he said, adding:

Danny Talwar, head of tax at Koinly, told Cointelegraph that centralized staking providers account for almost a quarter of all staked ETH, with Coinbase (11.4%), Kraken (6.9%), and Binance (5.2%) leading the way.

Talwar said that if the SEC moves on with its enforcement action, staking service providers will be forced to look outside the U.S. to offer their services.

If offshore exchanges with no Know Your Customer or Anti-Money Laundering compliance end up being major beneficiaries of the SEC cracking down on regulated, domestic, centralized exchanges, consumer protection may be the least likely outcome, he said.

While U.S. regulators are clamping down on staking services, crypto proponents are trying to convince regulators that high-yield lending interests offered by centralized entities and staking rewards on the Ethereum blockchain are not the same.

Staking crypto on a blockchain like Ethereum contributes to daily transaction verification. Thus, Ethereum staking differs from lending rewards like those offered by BlockFi and Celsius.

On the other hand, the SEC is looking to brand all kinds of staking services under a standard banner, Konstantin Boyko-Romanovsky, CEO of staking service provider Allnodes, told Cointelegraph.

Boyko-Romanovsky said prohibiting centralized exchanges from offering staking services would further enhance decentralization. He also noted that the governments approach might stifle adoption as many newcomers to crypto in the U.S. rely on centralized entities such as Coinbase for staking services.

He noted that staking pools might become more popular among retail stakers, explaining:

He added that those interested in staking will likely find alternative means. The focus of the regulatory bodies should be on creating precise and clear definitions for new and innovative concepts, such as staking. It would likely benefit customers more than attempting to force crypto instruments into existing fiat currency molds, he said.

Recent:What the Gensler hearing means for US crypto regulation and policy

The troubles of centralized staking services might work in favor of decentralized staking services and staking pools. After Krakens withdrawal of U.S-based validator nodes, most of these validators moved to Lido Finance, a decentralized staking pool service provider.

While it may help decentralization, the SECs stance on crypto staking could mean trouble for U.S.-based service providers. However, it remains to be seen whether firms like Coinbase uproot and move abroad, abandon significant market share in the domestic market, or make efforts to comply with SEC guidance and U.S. securities laws.

See original here:

SEC crackdown on crypto staking in the US could boost decentralization - Cointelegraph

Read More..

Social media decentralization underway : the progress of Lens … – Marketscreener.com

Social media is becoming an increasingly big part of our lives, both personal and professional. However, even as its importance grows, its structure stays untouched: our social profiles, together with all their connections, followers, and posts, are still stored and managed by one company, be it Meta or X. This gives the said companies the power to dispose of anyone's account as they wish, effectively silencing a person or ruining their business.

Web3 was born to provide an alternative to centrally managed services, and social media is arguably the Holy Grail of web3 applications poised to improve censorship resistance, as well as transparency and monetization practices.

So far, the Grail remains unclaimed, with projects like Steemit or Ecency that could not create enough traction. However, a new generation of decentralized social media (sometimes called DeSoc) is emerging, and Lens protocol is at its forefront.

What is Lens protocol?

Lens protocol is not one DApp (decentralized application), but rather an infrastructure. It offers adecentralized composable and portable social graph, which could be used to build all types of social networks. The graph records user profiles, their connections, posts, and interactions, which are stored in a decentralized way and can be carried from one Dapp to another.

User profiles are created as NFTs pointing at data storage, ensuring that users own their data and can move it from DApp to DApp, or even sell if necessary (the current floor price of a Lens profile NFT set at 0.1 ETH).

This approach has the potential to address the primary challenges that the industry faces:

Created by Aave Companies the firm behind the famous DeFi service Aave Lens protocol is praised for its modular structure, allowing easy upgrades and a high degree of customization.

Scalability is another strong focus, and launching Lens on Polygon, Ethereums layer-2, was an important step in ensuring that its DApps can scale. However, even Polygon might not be able to sustain the activity of a successful social media platform, which is why last week Lens protocol announced the launch of Momoka, a layer-3 hyperscalability solution. Momoka will process most transactions off-chain, while ensuring that data remains accessible and verifiable when needed for on-chain settlement, dispute resolution, or audits.

DApps already built on Lens

Lens protocol was released just a year ago, and despite still being closed to the general public (only whitelisted addresses can claim an NFT profile), it has already shown signs of success: 116,911 NFT profiles registered, an average of 100,000 daily transactions, and an increasing user engagement with an average of 76000 of posts, reposts and comments since February (source: Dune).

Among the DApps built on Lens, the most popular is Lenster, a decentralized version of Facebook with 44% of the overall Lens active users. The presence of popular crypto information resources such as Bankless or Messari, which now post regularly on Lenster, is driving adoption within the crypto community.

The second most popular Lens DApp is Phaver, a decentralized version of Instagram, available only on mobile and gathering 23% of all Lens active users. Phaver incentivizes users to vote (stake) on the content, remunerating those who voted early for a popular post.

Other social Dapps on Lens include Lenstube (a decentralized YouTube), Kaira (a decentralized version of Quora), and Collectz (an NFT marketplace), with more DApps in different stages of development and testing.

While Lens Protocol is gaining popularity among crypto enthusiasts, attracting non-crypto communities will be its main challenge when it finally opens to the public.

Additionally, alternative decentralized social media can become competition. Nostr, a decentralized platform leveraging the Bitcoin blockchain to allow users to exchange signed messages, has been rapidly gaining traction since Jack Dorsey endorsed it last December. It now counts over 780000 daily active users, mostly Bitcoin enthusiasts able to navigate its somewhat difficult interface.

Jack Dorsey's own initiative Bluesky, which also promises to fix social media via decentralization, has recently launched its mobile apps, and the number of users (so far invitation-only) keeps growing.

This competition, as well as the different technological approaches to disrupt social media, send a positive message about the future of the industry.

Written by D.Center

View post:

Social media decentralization underway : the progress of Lens ... - Marketscreener.com

Read More..

Sui Mainnet Goes Live as Crypto Project Takes on Aptos and DeFi Giants – CoinDesk

Sui, the buzzy layer 1 blockchain boasting a $2 billion valuation, launched its mainnet on Wednesday as it jockeyed to edge out rival Aptos and other decentralized finance (DeFi) heavyweights.

The token trades at $1.33 at press time, a significant rise from the pre-sale price of 3 cents and the public sale price of 10 cents. The market capitalization currently stands at $687 million, according to CoinGecko.

The blockchain, founded by ex-Meta Platforms (META) employees, has more than 200 projects in its directory and another 100-odd projects vying to build on its network.

Sui developers promised fast transaction speeds, which gradually increased as the network gained its footing on launchday. Speeds averaged around four transactions per second (4tps) minutes after the launch on Wednesday, data from Suis blockchain explorer shows. But, those speeds increased throughout the day, hovering around 18tps six hours after the launch. Aptos, by comparison, is pushing out at speeds of 9tps.

Sui faced several stumbling blocks on the decentralization front, however.

The network has more than 2,100 nodes operating across 43 countries. But those nodes are primarily concentrated in Germany and the U.S., with a smattering of nodes running across Asia and eastern Europe. Its worth noting that the network is still in its infancy, and that over time the distribution of validators will likely become more distributed.

The distribution of token holders also remains unclear at press time.

Mysten Labs, the blockchains core contributor, topped up its coffers with $300 million through a series of raises last year to support construction of the networks central infrastructure and fast-track the Sui ecosystems adoption.

Its success in securing VC funding pre-launch has invited comparisons to Aptos, another relatively young blockchain with a large VC backing. Both blockchains were designed by teams from Diem, Metas failed stablecoin project gamble, formerly known as Libra, that was shelved by the tech giant in 2022. And Move, a Rust-based programming language that was developed at Meta, undergirds both networks.

Critics have blasted Sui for its tokenomics in recent weeks.

In April, Sui disappointed some of its community members by announcing it would forgo an airdrop. Instead, SUI, the platform's native token for governance and gas, became available to community members for 3 cents per token in an early sale on three exchanges OKX, KuCoin and ByBit. There was a later token sale for 10 cents per token capped at 10,000 tokens per person.

Meanwhile, Binance added support for SUI to BNB and TUSD holders through its bootstrapping portal, Launchpad, earlier this week. Users in the U.S. were not eligible for the early sale program.

UPDATE: Provides information about transactions per second on Sui six hours after the mainnet's launch.

The rest is here:

Sui Mainnet Goes Live as Crypto Project Takes on Aptos and DeFi Giants - CoinDesk

Read More..

Innovation The Brooklyn Rail – Brooklyn Rail

In recent years DAOs have been heralded as a powerful stimulus for reshaping how value systems for interdependence and cooperation manifest themselves in arts organizing. The book Radical Friends Decentralised Autonomous Organisations and the Arts consolidates five years of research into a toolkit for fierce thinking, as well as for new forms of radical care and connectivity that move beyond the established systems of centralized control in the art industry and wider financial networks. Over the course of the book, contributors engage in both past and emergent methodologies for building resilient and mutable systems for mutual aid. Just short of a year later, the two editors accept Charlottes challenge and look back at what is circulating, unsolved and ruminating still for them as friends, collaborators and practitioners in the field in this short self-interview:

Penny Rafferty: So, Ruth, what is the one word you would expunge from conversations about art and technology?

Ruth Catlow: Imagine if we could erase the word innovation! This word has been attaching itself to art and technology for decades, to secure funding and favor. But as a stand-alone signifier, it refuses to recognise or value, let alone delight-in, what already exists, instead demanding to see the next thing at all costs. And the cost might just be our survival. Ah Just imagine the plural planetary realities that might flourish if imagination was unshackled from innovation and partnered instead with care! What underused word would you most like to see become central in conversations about art and technology now?

Rafferty: Take for instance the word decentralization: we have already seen a fork that goes beyond the binary of centralization and its decentralized counterpart, but we hardly ever ask, are you working towards vertical decentralizationallowing voting power whilst still maintaining and embedding authority, guideline policies, controls, checks and social capitalor are you working towards horizontal decentralization, where members are socially and institutionally equal, with dissolvable power structures set in place? Greater understanding of the complexity of the world we operate insideecologically, financially, ethically and creativelyis needed. Springboarding from this, what do you think is still the most misunderstood part of our research to a wider audience?

Catlow: I think, in spite of the fact that our book offers a deep critique of technocapitalisms propensity to bore holes into, and so destabilize the foundations of crucial social infrastructure, our research is still mistaken for an exercise in blockchain-boosterism, rather than an earnest community claim to tools that can help shape lively infrastructures of translocal belonging. But Penny, What are you now most excited to add to the stack of Radical Friends?

Rafferty: When DAO ecosystems were nascent at best, I learned about the concept of micro-gridding, which sits contrary to the traditional, centralized macro-grids we typically operate under. Microgrids can actually disconnect from the centralized grid and operate autonomously, strengthen grid resilience, and help mitigate grid disturbances. They work towards a new distributed generation. For me, this was always the future of DAOs if they were to have a social, political and human impact; where scalability always falls short. As a direct consequence of the surge of DAOs and our research together, I can say I am extremely excited about adding a translocal networked tooling application to the stack, which maybe I can leak: we are already working on the blueprints for the Serpentine Galleries Blockchain Lab.

The rest is here:

Innovation The Brooklyn Rail - Brooklyn Rail

Read More..

5 Reasons Why You Should Care About Web3 – Forbes

Web3 has the potential to disrupt pretty much everything we know about life online and who controls it. But as with any technology thats rapidly evolving, it can be hard to separate the facts from the wishful thinking. So if youve struggled to get your head around the web3 hype or wonder why web3 matters this article is for you.

5 Reasons Why You Should Care About Web3

Adobe Stock

First up, what is web 3.0?

Web3 or web 3.0 is basically the next iteration of the Internet. It follows on from the previous two evolutionary phases of the Internet, i.e., web1 (or web 1.0), the birth of the internet we all know and love, and then web2 (aka web 2.0), the more interactive, user-generated, social media-driven web that exploded over the last decade.

Web3 represents the next big evolutionary leap forward of the Internet a leap thats driven by blockchain, NFTs, and cryptocurrency. But perhaps the biggest defining feature of web3 is decentralization, which brings us to our first reason why you should care about web3.

In the decentralized web3 era, internet users will have more control

Thats the idea, anyway. Because web3 represents a decentralized internet, as opposed to todays highly centralized Internet. If you think about it, most of the sites we use today are owned by major corporations (like Meta, Google, and Amazon) and to some extent are controlled by government regulations. Power is centralized.

Web1 and web2 evolved this way because the infrastructure required to build and run the Internet is expensive, and someone has to pay for it! These powerful corporations earn back their investment (and, lets be honest, a lot more on top) either by charging us to use their services or by harvesting and using (often selling) our extremely valuable personal data. Web3 and the decentralized internet promise to change all this, or at least ensure that centralization isn't the only way forward. How is this possible? Because web3 platforms are powered largely by token-based economics and blockchain-based infrastructures where, typically, no one central authority is in charge, and users can transact and interact without third-party intervention.

A good example of the decentralized web comes from Secretum, a messaging app with the aim of becoming the web3 version of WhatsApp or WeChat. Secretum users can connect without an email address or phone number, which promotes user privacy, and there's a built-in trading function, allowing users to trade crypto and NFTs securely without the oversight of banks or other facilitators.

Web3 just might kick off a major power shift

Dwelling on this vision of a decentralized internet, where control is taken away from intermediaries and authorities and placed in the hands of users, its clear this represents a major power shift. With web3, we could freely access the Internet without forking over our personal information, have full ownership of our data, and not be dependent on centralized authorities who don't always have our best interests at heart. It's a rejection of how things are currently done. Its a rallying cry of sorts.

The question is, will web3 actually end up reducing the huge amount of control that todays power players have and make the Internet more democratic? Certainly, big tech giants, central banks, and governments have a vested interest in retaining some oversight and of course, we all want the Internet to be a safe place and not the new Wild West.

Ultimately, I suspect organizations like Meta will evolve, and new organizations will arise to facilitate web3 interactions for example, having a digital wallet thats managed and protected by a third-party platform. Thats still some form of centralization, obviously. But I do believe web3 will offer us the chance to create a more equitable internet, where users have more choice and greater autonomy.

Web3 will underpin much of the metaverse

Web3 technologies are inherently linked with the development of the metaverse since they will allow us to interact and transact with others in metaverse environments. For example, NFTs and blockchain both web3 technologies will allow us to own and trade digital assets in the metaverse, whether its digital art, digital land, or digital sneakers. Cryptocurrency will most likely form the foundations of economic and monetary systems in the metaverse. And many of the virtual worlds that will ultimately form part of the metaverse (places like the Decentraland virtual world) are built on blockchain.

Basically, the metaverse cant reach its full potential without web3 technologies. So when you hear people like me getting excited about the metaverse, know that web3 is a vital part of that future.

NFTs will have real-world uses

Weve all seen the crazy price swings and headlines around the sale of NFTs. But if we think of NFTs as digital tokens that represent ownership of assets, its clear that NFTs can deliver much more value than just trading jpegs of cartoon animals.

In fact, many experts believe that utility NFTs will be used to represent ownership of real-world items and assets, such as tickets to events. Imagine the Burning Man festival decided to sell lifetime tickets, and you bought one of those tickets. Having it as an NFT is much easier and more secure than keeping a paper copy or an email confirmation in an account that you no longer use in 20 years time.

Blockchain will transform business operations

So far, we havent touched on the business impact of web3, but I believe this next evolution of the Internet will have a significant impact on how businesses operate. The most transformative web3 technology for businesses is undoubtedly blockchain. Indeed, Im already seeing blockchain being adopted in a wide range of industries.

As an example, blockchain is ideally suited to the supply chain, where it can be used to facilitate the transfer of goods from one party to another and allow organizations to track the status of goods in real-time. In this way, blockchain increases the security and transparency of the supply chain and generally makes the whole process much more efficient. Which is why Walmart and its Food Safety Collaboration Center in Beijing use blockchain to track farm origination details, batch numbers, factory and processing data, expiration dates, storage temperature, and shipping details for pork.

Any industry that needs to track supplies, materials, and products can benefit from blockchain and thats just one example of how blockchain will revolutionize the world of business. So, if you think web3 has no relevance to your organization, think again.

To stay on top of the latest on new and emerging business and tech trends, make sure to subscribe to my newsletter, follow me on Twitter, LinkedIn, and YouTube, and check out my books, Future Skills: The 20 Skills and Competencies Everyone Needs to Succeed in a Digital World and Future Internet: How the Metaverse, Web 3.0, and Blockchain Will Transform Business and Society.

Bernard Marr is an internationally best-selling author, popular keynote speaker, futurist, and a strategic business & technology advisor to governments and companies. He helps organisations improve their business performance, use data more intelligently, and understand the implications of new technologies such as artificial intelligence, big data, blockchains, and the Internet of Things. Why dont you connect with Bernard on Twitter (@bernardmarr), LinkedIn (https://uk.linkedin.com/in/bernardmarr) or instagram (bernard.marr)?

See the rest here:

5 Reasons Why You Should Care About Web3 - Forbes

Read More..

Global Point of Care (PoC) Molecular Diagnostics Market Research Report 2023-2027: The New Automation, Decentralization and Point Of Care – Next…

DUBLIN, May 4, 2023 /PRNewswire/ --The "Molecular Diagnostics at the Point of Care. By Application, Technology, Place, Product and by Country. With Executive Guides and Customization 2023 - 2027 " report has been added to ResearchAndMarkets.com's offering.

Research_and_Markets_Logo

The two key trends of Point of Care Testing and Molecular Diagnostics are merging with spectacular success. It could possibly displace most frontline test protocols AND save money at the same time. The report forecasts the market size out for five years.

Infectious disease Dx is changing and will change more in the future. Can a rapidly growing market expand even faster? Find out all about it in this comprehensive report on Molecular Diagnostics at the Point of Care.

Are targeted tests for specific pathogens going to be obsolete? Will diagnostics replace physicians? Will Point of Care testing move into the Physician's Office or even the Home?

Point of Care testing is proving itself in the market. Players are reporting double-digit growth. Lowering costs, improving outcomes and even helping in the battle against Anti Microbial Resistance.

Learn about this market including the issues and outlooks.

Key Topics Covered:

1 Market Guides1.1 Strategic Situation Analysis 1.2 Guide for Executives, Marketing and Business Development Staff 1.3 Guide for Management Consultants and Investment Advisors

2 Introduction and Market Definition 2.1 What are Molecular Diagnostics at the Point of Care? 2.2 The Diagnostics Revolution 2.3 Market Definition 2.4 Methodology 2.5 Perspective: Healthcare and the IVD Industry 2.5.1 Global Healthcare Spending 2.5.2 Spending on Diagnostics 2.5.3 Important Role of Insurance for Diagnostics

3 Instrumentation, Automation and Diagnostic Trends3.1 Instrumentation and Automation3.1.1 Traditional Automation and Centralization 3.1.2 The New Automation, Decentralization and Point Of Care 3.1.3 Instruments Key to Market Share 3.1.4 Bioinformatics Plays a Role 3.1.5 PCR Takes Command 3.1.6 Next Generation Sequencing Fuels a Revolution 3.1.7 NGS Impact on Pricing 3.1.8 Whole Genome Sequencing, A Brave New World3.1.9 Companion Diagnostics Blurs Diagnosis and Treatment

Story continues

4 Industry Overview 4.1 Players in a Dynamic Market 4.1.1 Academic Research Lab 4.1.2 Diagnostic Test Developer4.1.3 Instrumentation Supplier 4.1.4 Chemical/Reagent Supplier 4.1.5 Pathology Supplier4.1.6 Independent Clinical Laboratory4.1.7 Public National/regional Laboratory 4.1.8 Hospital Laboratory 4.1.9 Physicians Office Lab (POLS)4.1.10 Audit Body 4.1.11 Certification Body.4.2 The Clinical Laboratory Market Segments 4.2.1 Traditional Market Segmentation4.2.2 Laboratory Focus and Segmentation 4.3 Industry Structure 4.3.1 Hospital Testing Share 4.3.2 Economies of Scale 4.3.2.1 Hospital vs. Central Lab 4.3.3 Physician Office Lab's 4.3.4 Physician's and POCT

5 Profiles of Key MDx Companies 5.1 Abacus Diagnostica 5.2 Abbott Laboratories 5.3 Accelerate Diagnostics5.4 Access Bio 5.5 Ador Diagnostics 5.6 ADT Biotech 5.7 Akonni Biosystems 5.8 Alveo Technologies 5.9 Antelope Dx 5.10 Applied BioCode 5.11 Aureum Diagnostics 5.12 Aus Diagnostics 5.13 Baebies 5.14 Beckman Coulter Diagnostics 5.15 Becton, Dickinson and Company 5.16 Binx Health 5.17 Biocartis 5.18 BioFire Diagnostics (bioMerieux) 5.19 bioMerieux Diagnostics 5.20 Bio-Rad Laboratories, Inc.5.21 Bosch Healthcare Solutions GmbH 5.22 Cepheid (Danaher) 5.23 Credo Diagnostics Biomedical5.24 Cue Health 5.25 Curetis N.V./Curetis GmbH 5.26 Detect 5.27 Diagenode Diagnostics 5.28 Diasorin S.p.A. 5.29 Enzo Biochem 5.30 Eurofins Scientific 5.31 Fluxergy5.32 Fusion Genomics.5.33 Genedrive5.34 Genetic Signatures 5.35 GenMark Dx (Roche) 5.36 Getlabs5.37 Grip Molecular Technologies 5.38 Hibergene Diagnostics 5.39 Hologic 5.40 Immunexpress 5.41 Inflammatix 5.42 Invetech 5.43 Janssen Diagnostics5.44 Karius5.45 Lexagene 5.46 LightDeck Diagnostics5.47 Lucira Health5.48 Luminex Corp 5.49 LumiraDx 5.50 Maxim Biomedical 5.51 Meridian Bioscience5.52 Mesa Biotech (Thermo Fisher)5.53 Millipore Sigma5.54 Mobidiag (Hologic) 5.55 Molbio Diagnostics 5.56 Nanomix 5.57 Novacyt 5.58 Novel Microdevices5.59 Operon 5.60 Ortho Clinical Diagnostics 5.61 Oxford Nanopore Technologies5.62 Panagene5.63 Perkin Elmer 5.64 Prenetics 5.65 Primerdesign (Novacyt) 5.66 Prominex 5.67 Qiagen 5.68 QuantuMDx 5.69 Quidel 5.70 Roche Molecular Diagnostics5.71 Salignostics 5.72 Saw Diagnostics 5.73 SD Biosensor 5.74 Seegene 5.75 Siemens Healthineers 5.76 Sona Nanotech 5.77 SpeeDx 5.78 T2 Biosystems5.79 Talis Biomedical 5.80 Thermo Fisher Scientific Inc.5.81 Veramarx 5.82 XCR Diagnostics 5.83 Zhejiang Orient Gene Biotech

6 Market Trends 6.1 Factors Driving Growth 6.1.1 New Genotypes Creating New Markets 6.1.2 Aging Population a Boon for All Diagnostics6.1.3 Developing World Driving ID Dx Growth 6.1.4 Point of Care - Why Centralization is Losing Steam 6.1.5 Self Testing6.1.6 The Need for Speed6.2 Factors Limiting Growth 6.2.1 Lower Costs 6.2.2 Infectious Disease is Declining6.2.3 Wellness Hurts 6.2.4 Economic Growth improves Living Standards

7 Molecular Dx - Infectious Disease Recent Developments 7.1 Recent Developments - Importance and How to Use This Section 7.1.1 Importance of These Developments 7.1.2 How to Use This Section 7.2 Sherlock Biosciences Adds to Infectious Disease Dx Toolkit7.3 NanoDx Prepares for Point-of-Care Commercialization 7.4 Paragraf to Study New POC Test to Guide Antibiotic Selection 7.5 MicroGEM to Expand 30-Minute RT-PCR System 7.6 Startup Detect to Roll Out Next-Gen Molecular Instrument7.7 Diagnostics for the Real World Third-Generation POC Platform 7.8 Salignostics Closes Funding Round7.9 Cue Health Targets DTC Market in 20227.10 Grip Molecular Developing Home Respiratory Panel 7.11 Mainz Biomed Developing Home ColoAlert Assay 7.12 MFB Fertility Closes Series A Financing Round 7.13 Home Test Company Prenetics to go Public7.14 Roche to Acquire TIB Molbiol to Expand Infectious Disease Portfolio 7.15 BforCure Preparing Multiple Panels for Point-of-Care qPCR Platform7.16 Talis Biomedical Discusses Point-of-Care 7.17 Roche to Acquire GenMark Diagnostics for $1.8B 7.18 Pandemic Pushes Handheld qPCR Devices Closer to Commercialization7.19 Hologic to Acquire Mobidiag7.20 Lucira Health Focuses on User Friendly Approach to Home Testing 7.21 Infectious Disease Dx Firm Talis Biomedical Raises $254M in IPO 7.22 Fluidigm Plans 'Durable' Diagnostics, Clinical Business 7.23 Thermo Fisher Scientific to Acquire Mesa Biotech for Up to $550M7.24 Mammoth Biosciences Developing Pathogen Detection Tech 7.25 Illumina, IDbyDNA Developing Sequencing-Based Respiratory Tests 7.26 Scanogen Developing 90 Minute Infection Test 7.27 Malaria Assays Use CRISPR for Point-of-Care Multispecies Detection7.28 FDA Provides Self Testing SARS-CoV-2 EAU Guidance 7.29 Mammoth Biosciences Announces Rapid, CRISPR-Based COVID-19 Diagnostic 7.30 Genetic Signatures Gets CE Mark for Coronavirus Molecular Test 7.31 Qiagen Respiratory Panel with Coronavirus Receives CE Mark 7.32 Lumos Diagnostics Closes $15M Series A Funding

For more information about this report visit https://www.researchandmarkets.com/r/joij7w

About ResearchAndMarkets.com

ResearchAndMarkets.com is the world's leading source for international market research reports and market data. We provide you with the latest data on international and regional markets, key industries, the top companies, new products and the latest trends.

Media Contact:Research and MarketsLaura Wood, Senior Managerpress@researchandmarkets.comFor E.S.T Office Hours Call +1-917-300-0470For U.S./CAN Toll Free Call +1-800-526-8630For GMT Office Hours Call +353-1-416-8900U.S. Fax: 646-607-1907Fax (outside U.S.): +353-1-481-1716

Logo: https://mma.prnewswire.com/media/539438/Research_and_Markets_Logo.jpg

Cision

View original content:https://www.prnewswire.com/news-releases/global-point-of-care-poc-molecular-diagnostics-market-research-report-2023-2027-the-new-automation-decentralization-and-point-of-care---next-generation-sequencing-fuels-a-revolution-301815798.html

SOURCE Research and Markets

Read this article:

Global Point of Care (PoC) Molecular Diagnostics Market Research Report 2023-2027: The New Automation, Decentralization and Point Of Care - Next...

Read More..