Page 2,500«..1020..2,4992,5002,5012,502..2,5102,520..»

3 Reasons to Buy Palantir, And 1 Reason To Sell – The Motley Fool

Palantir's (NYSE:PLTR) stock price tumbled 9% on Tuesday after the data-mining firm posted its third-quarter earnings. The pullback was a bit surprising since its growth rates looked healthy and it offered rosy guidance for the full year.

Let's dig deeper into Palantir's third-quarter report, and review three compelling reasons to buy the stock -- as well as one reason to sell it.

Image source: Palantir.

Palantir's revenue rose 36% year over year to $392 million, which beat analysts' expectations by about $5.5 million.

Palantir generated 56% of its quarterly revenue from government contracts and the remaining 44% from commercial contracts. When Palantir went public last September, the bears claimed it would struggle to expand its commercial business to reduce its dependence on government contracts.

However, Palantir's commercial growth actually accelerated throughout 2021 and grew faster than its government business in the third quarter:

Revenue Growth (YOY)

FY 2019

FY 2020

Q1 2021

Q2 2021

Q3 2021

Government

35%

77%

76%

66%

34%

Commercial

17%

22%

19%

28%

37%

Total

25%

47%

49%

49%

36%

Source: Palantir. YOY = Year over year.

Palantir attributed that acceleration to the growth of its U.S. commercial business, which more than doubled its revenue year over year.

Its commercial customer count rose 46% sequentially and more than doubled since the beginning of the year. Its average revenue per top-20 customer also increased 35% year over year. Those growth rates suggest that Palantir's hardened reputation as a data mining platform for the U.S. government is attracting a lot of attention from enterprise customers.

Palantir's government business also continued to grow against tough year-over-year comparisons, as it secured new contracts with the U.S. Air Force, the U.S. Department of Health and Human Services, and the NIH.

Palantir expects its revenue to rise 40% to $1.53 billion for the full year. It also maintained its long-term guidance for more than 30% annual revenue growth from 2021 to 2025.

Palantir is still unprofitable on a generally accepted accounting practices (GAAP) basis. It posted a net loss of $102.1 million during the third quarter, compared to its loss of $853.3 million a year ago (which bore the impact of the high stock-based compensation expenses related to its direct listing).

However, its adjusted (non-GAAP) gross and operating margins, which exclude its stock-based compensation and other one-time expenses, expanded year over year and remained stable quarter over quarter:

Period

Q3 2020

Q2 2021

Q3 2021

Adjusted Gross Margin

81%

82%

82%

Adjusted Operating Margin

25%

31%

30%

Source: Palantir.

As a result, Palantir's non-GAAP net income rose 51% year over year to $82.1 million, or $0.04 per share, which matched analysts' expectations.

That profit growth indicates Palantir still has plenty of pricing power, and its operating margins are improving as it scales up its main platforms.

Palantir's strong growth in revenue and adjusted profits turned its adjusted free cash flow (FCF) positive this year.

Period

First 9 months of 2020

First 9 months of 2021

Adjusted free cash flow

($285 million)

$320 million

Source: Palantir.

In its third-quarter report, it boosted its full-year adjusted FCF guidance by about $100 million to more than $400 million.

Palantir is growing rapidly, but its stock still trades at over 30 times this year's sales. That high price-to-sales ratio could limit its near-term gains.

Palantir's excessive use of stock-based compensation also caused its weighted-average shares to more than double year over year in the third quarter. As a result, its non-GAAP earnings per share (EPS) remained flat from a year ago even as its adjusted net income increased 51%.

That ongoing dilution is common for unprofitable high-growth companies, but it could also prevent Palantir's valuations from cooling off. Its frequent usage of non-GAAP metrics also masks the fact that nearly two decades after its inception, Palantir still lacks a viable path toward GAAP profitability.

Investors should realize that Palantir is a risky and volatile stock. That said, I still believe its strengths outweigh its weaknesses.

Palantir's valuation is high, but it isn't outrageous in a market that values Cloudflare (NYSE:NET) at nearly 100 times this year's sales and CrowdStrike (NASDAQ:CRWD) at almost 50 times this year's sales. For reference, Wall Street expects Cloudflare and CrowdStrike's revenues to increase 49% and 61%, respectively, this year.

Palantir isn't growing as rapidly as those two cloud-based companies, but it's equally disruptive. Just as Cloudflare is changing how companies secure their websites and deliver digital media, and how CrowdStrike is disrupting the cybersecurity market with cloud-native services, Palantir is changing how government agencies and large companies collect and analyze data from disparate sources to make data-driven decisions.

In short, Palantir remains a compelling long-term play for investors who can stomach the near-term volatility. If it achieves its goal of generating more than $4.3 billion in revenue by 2025, its stock could easily triple or generate even bigger multibagger gains over the next few years.

This article represents the opinion of the writer, who may disagree with the official recommendation position of a Motley Fool premium advisory service. Were motley! Questioning an investing thesis -- even one of our own -- helps us all think critically about investing and make decisions that help us become smarter, happier, and richer.

See the original post here:

3 Reasons to Buy Palantir, And 1 Reason To Sell - The Motley Fool

Read More..

Top Pros and Cons of AI in Cloud Computing for You to Know – Analytics Insight

Disruptive technologies such as AI and cloud computing are thriving in Industry 4.0 owing to the adoption of digital transformation. Every coin has two sides. Similarly, implementing AI in cloud computing has certain pros and cons. Lets go through some of the top pros and cons of AI in cloud computing that every organization should know about.

Redesigning IT Infrastructure: The reconfiguration of IT infrastructure is one of the main benefits of AI in cloud computing. With todays increasing competition, the necessity for creative attempts to stay afloat has become unavoidable. As a result, using AI-optimized application architecture is critical.

Applications for Data Mining: The use of AI in cloud computing can aid in the identification of useful data. AI can assist in the management of data quantities that are extremely large. Your cloud environments responsiveness will also improve as a result of this.

Advantages of Analytics: Implementing AI in the cloud can provide significant analytical benefits. With the analytics advantage, using AI in the cloud may assist relieve the load of human labor in completing such activities, as well as save money for highly skilled and specialized analysts.

Cost-saving measures: Because on-premise datacenters are not required, the combination of artificial intelligence and cloud computing promises to reduce costs. They also help with cost-cutting in research and development.

Making Better Decisions: When it comes to making judgments, a mix of AI in the cloud can produce the greatest results. By learning from previous data and comparing it to current patterns in the data, AI may assist in finding patterns and trends in various datasets.

Cloud Security Automation: The use of artificial intelligence (AI) in cloud computing can aid cloud security. The use of AI in the cloud may analyze data on cloud infrastructure and discover discrepancies right away.

Concerns about connectivity: In cloud computing, AI requires consistent connectivity. The benefits of cloud-based AI tools might be hampered by poor internet connectivity. Although cloud computing is faster than traditional computing, there is a latency issue in the cloud that causes a delay in getting replies.

Data Privacy: Because AI applications are data-driven, they necessitate a significant quantity of data, including information on customers and vendors. Enterprises have a lot of sensitive data that hackers might target for data breaches. As a result, while utilizing AI in cloud computing, businesses must develop privacy rules and safeguard all data.

Integration: When two technologies join together for the first time, there is always an integration problem. Before adding the AI layer to the cloud, a company or organization must migrate all of its apps and technology to the cloud. For many businesses, this is a big issue in and of itself.

That being said, every organization needs to go through extensive research on the pros and cons of AI in cloud computing before leveraging these cutting-edge technologies to be in the current global trend.

Share This ArticleDo the sharing thingy

About AuthorMore info about author

Analytics Insight is an influential platform dedicated to insights, trends, and opinions from the world of data-driven technologies. It monitors developments, recognition, and achievements made by Artificial Intelligence, Big Data and Analytics companies across the globe.

See the article here:

Top Pros and Cons of AI in Cloud Computing for You to Know - Analytics Insight

Read More..

Neural Network Software Market Research Report by Component, by Type, by Vertical, by Region – Global Forecast to 2026 – Cumulative Impact of COVID-19…

Neural Network Software Market Research Report by Component (Services and Software), by Type (Analytical Software, Data Mining & Archiving, and Optimization Software), by Vertical, by Region (Americas, Asia-Pacific, and Europe, Middle East & Africa) - Global Forecast to 2026 - Cumulative Impact of COVID-19

New York, Nov. 10, 2021 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Neural Network Software Market Research Report by Component, by Type, by Vertical, by Region - Global Forecast to 2026 - Cumulative Impact of COVID-19" - https://www.reportlinker.com/p06183397/?utm_source=GNW

The Global Neural Network Software Market size was estimated at USD 12.09 billion in 2020 and expected to reach USD 13.43 billion in 2021, at a CAGR 11.39% to reach USD 23.11 billion by 2026.

Market Statistics:The report provides market sizing and forecast across five major currencies - USD, EUR GBP, JPY, and AUD. It helps organization leaders make better decisions when currency exchange data is readily available. In this report, the years 2018 and 2019 are considered historical years, 2020 as the base year, 2021 as the estimated year, and years from 2022 to 2026 are considered the forecast period.

Market Segmentation & Coverage:This research report categorizes the Neural Network Software to forecast the revenues and analyze the trends in each of the following sub-markets:

Based on Component, the market was studied across Services and Software.

Based on Type, the market was studied across Analytical Software, Data Mining & Archiving, Optimization Software, and Visualization Software. The Optimization Software is further studied across Genetic Algorithm and Simulated Annealing.

Based on Vertical, the market was studied across BFSI, Energy & Utilities, Government & Defense, Healthcare, Industrial Manufacturing, Media, Retail & Ecommerce, Telecom & IT, and Transportation & Logistics.

Based on Region, the market was studied across Americas, Asia-Pacific, and Europe, Middle East & Africa. The Americas is further studied across Argentina, Brazil, Canada, Mexico, and United States. The United States is further studied across California, Florida, Illinois, New York, Ohio, Pennsylvania, and Texas. The Asia-Pacific is further studied across Australia, China, India, Indonesia, Japan, Malaysia, Philippines, Singapore, South Korea, Taiwan, and Thailand. The Europe, Middle East & Africa is further studied across France, Germany, Italy, Netherlands, Qatar, Russia, Saudi Arabia, South Africa, Spain, United Arab Emirates, and United Kingdom.

Cumulative Impact of COVID-19:COVID-19 is an incomparable global public health emergency that has affected almost every industry, and the long-term effects are projected to impact the industry growth during the forecast period. Our ongoing research amplifies our research framework to ensure the inclusion of underlying COVID-19 issues and potential paths forward. The report delivers insights on COVID-19 considering the changes in consumer behavior and demand, purchasing patterns, re-routing of the supply chain, dynamics of current market forces, and the significant interventions of governments. The updated study provides insights, analysis, estimations, and forecasts, considering the COVID-19 impact on the market.

Competitive Strategic Window:The Competitive Strategic Window analyses the competitive landscape in terms of markets, applications, and geographies to help the vendor define an alignment or fit between their capabilities and opportunities for future growth prospects. It describes the optimal or favorable fit for the vendors to adopt successive merger and acquisition strategies, geography expansion, research & development, and new product introduction strategies to execute further business expansion and growth during a forecast period.

FPNV Positioning Matrix:The FPNV Positioning Matrix evaluates and categorizes the vendors in the Neural Network Software Market based on Business Strategy (Business Growth, Industry Coverage, Financial Viability, and Channel Support) and Product Satisfaction (Value for Money, Ease of Use, Product Features, and Customer Support) that aids businesses in better decision making and understanding the competitive landscape.

Market Share Analysis:The Market Share Analysis offers the analysis of vendors considering their contribution to the overall market. It provides the idea of its revenue generation into the overall market compared to other vendors in the space. It provides insights into how vendors are performing in terms of revenue generation and customer base compared to others. Knowing market share offers an idea of the size and competitiveness of the vendors for the base year. It reveals the market characteristics in terms of accumulation, fragmentation, dominance, and amalgamation traits.

Competitive Scenario:The Competitive Scenario provides an outlook analysis of the various business growth strategies adopted by the vendors. The news covered in this section deliver valuable thoughts at the different stage while keeping up-to-date with the business and engage stakeholders in the economic debate. The competitive scenario represents press releases or news of the companies categorized into Merger & Acquisition, Agreement, Collaboration, & Partnership, New Product Launch & Enhancement, Investment & Funding, and Award, Recognition, & Expansion. All the news collected help vendor to understand the gaps in the marketplace and competitors strength and weakness thereby, providing insights to enhance product and service.

Company Usability Profiles:The report profoundly explores the recent significant developments by the leading vendors and innovation profiles in the Global Neural Network Software Market, including Afiniti Inc., Alyuda Research, LLC, Ayima Ltd, BWMC Ltd, Clarifai Inc., DataRobot, Inc., Google LLC, IBM Corporation, Intel Corporation, Microsoft Corporation, Neural Designer, Neural Technologies Incorporated, NeuroDimension, Inc., NVIDIA Corporation, Oracle Corporation, Qualcomm Incorporated, SAP SE, SAS AB, Slagkryssaren GmbH, Sony Network Communications Inc., Starmind International AG, Ward Systems Group, Inc., Ward Systems Inc, and XenonStack.

The report provides insights on the following pointers:1. Market Penetration: Provides comprehensive information on the market offered by the key players2. Market Development: Provides in-depth information about lucrative emerging markets and analyze penetration across mature segments of the markets3. Market Diversification: Provides detailed information about new product launches, untapped geographies, recent developments, and investments4. Competitive Assessment & Intelligence: Provides an exhaustive assessment of market shares, strategies, products, certification, regulatory approvals, patent landscape, and manufacturing capabilities of the leading players5. Product Development & Innovation: Provides intelligent insights on future technologies, R&D activities, and breakthrough product developments

The report answers questions such as:1. What is the market size and forecast of the Global Neural Network Software Market?2. What are the inhibiting factors and impact of COVID-19 shaping the Global Neural Network Software Market during the forecast period?3. Which are the products/segments/applications/areas to invest in over the forecast period in the Global Neural Network Software Market?4. What is the competitive strategic window for opportunities in the Global Neural Network Software Market?5. What are the technology trends and regulatory frameworks in the Global Neural Network Software Market?6. What is the market share of the leading vendors in the Global Neural Network Software Market?7. What modes and strategic moves are considered suitable for entering the Global Neural Network Software Market?Read the full report: https://www.reportlinker.com/p06183397/?utm_source=GNW

About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________

Story continues

See the original post:

Neural Network Software Market Research Report by Component, by Type, by Vertical, by Region - Global Forecast to 2026 - Cumulative Impact of COVID-19...

Read More..

Southern Cities Rank High on List of Places With Highest Rates of Car Accidents – Insurance Journal

Almost a third of the U.S. cities with the highest percentage of drivers with prior automobile accidents are in the Southeast, according to a study by Insurify, an insurance data-analysis and rate comparison firm.

The city with the highest percentage of drivers with prior at-fault accidents more than 20% was Johns Island, South Carolina, next to Charleston. Rounding out the top five were: Silver Spring, Maryland; Frisco, Texas; Woodbridge, Virginia; and Roseville, California, the study found.

The report examined a database of 1.6 million car insurance applications to come up with the rankings. The database, compiled by City-Data, a data mining firm, includes driver history for the last seven years, Insurify said in a news release.

The report did not explain why drivers in Johns Island, population 21,500, appear to have more than their share of accidents on their records. The data do show that the island drivers had a relatively low rate of driving under the influence 1.3%. That compares to more than 4% in Lincoln, Nebraska; Fayetteville, Arkansas; and Roseville, California.

Other Southeastern cities in the top 20 places with highest accident rates included Woodstock, Georgia, with 16.3% of drivers with prior accidents; Murfreesboro, Tennessee, which ranked 12th on the list; Pensacola, Florida, ranking 15th with 15.6% of its drivers with prior incidents; Fayetteville, Arkansas, coming in at 18th place; and Charlotte, North Carolina, at number 20.

Topics Auto

Was this article valuable?

Yes No

Here are more articles you may enjoy.

Get automatic alerts for this topic.

Link:

Southern Cities Rank High on List of Places With Highest Rates of Car Accidents - Insurance Journal

Read More..

Comets Find Right Ingredients, Win Business Hall of Fame Scholarships – University of Texas at Dallas

A Master of Business Administration student and a recent computer science graduate from The University of Texas at Dallas each have been awarded $15,000 Mitchell Family Foundation Scholar Awards from the Texas Business Hall of Fame Foundation.

Both Comets built their new-venture experience through food startups.

Mercedes Johnson BA19

Mercedes Johnson BA19, an MBA student in the Naveen Jindal School of Management, created Food Magnet, an app that helps customers find food trucks and food trucks find business. Rohit K. Shenoy BS21, an alumnus of the Erik Jonsson School of Engineering and Computer Science, was a co-founder of CampusOven, a catered meal delivery service that focused on bringing fresh, healthy dining alternatives to students.

Johnson, who earned a bachelors degree in arts, technology, and emerging communication and now works as a principal user experience designer at Capital One, returned to UT Dallas to pursue her MBA after learning that the program offered a concentration in innovation and entrepreneurship.

While taking an innovation and entrepreneurship accelerator course during her first semester, she came up with the Food Magnet idea.

My goal is to be a serialpreneur, said Johnson, who wants to eventually start her own production company.

Rohit K. Shenoy BS21

Shenoy, a Eugene McDermott Scholar, became involved with the UTD Entrepreneurship Club and the Institute for Innovation and Entrepreneurships Blackstone LaunchPad during his freshman year. He participated in the CometX Accelerator program; interned at Tech Wildcatters, a startup accelerator in Dallas; and was a venture analyst in the UT Dallas Seed Fund. The CampusOven team was a finalist in the 2020 Big Idea Competition.

From talking to venture capitalists in the area, I truly believe that Texas will continue to grow rapidly and become a major center for entrepreneurial activity in the coming decade, said Shenoy, who is now working to create a data mining and analysis startup. And I look forward to being a part of this movement.

The winners were announced via video by Gaurav Sethi BS20, who was chief financial officer of CampusOven and earned a Mitchell Family Foundation Scholar Award last year. The awards were presented Oct. 28 at the Texas Business Hall of Fame Annual Scholar & Veteran Award Luncheon in Dallas.

The Texas Business Hall of Fame was formed in 1982 to honor outstanding business leaders in Texas and to inspire the leaders of the future by funding scholarships that help recipients pursue their business educations at Texas schools.

Accolades is an occasional News Center feature that highlights recent accomplishments of The University of Texas at Dallas faculty and students. To submit items for consideration, contact your schoolscommunications manager.

Excerpt from:

Comets Find Right Ingredients, Win Business Hall of Fame Scholarships - University of Texas at Dallas

Read More..

Letter: Insurance industry is exploitative – The Columbian

Credit-based insurance premium scoring was a financial windfall for the insurance industry that justified raising insurance rates on people with low credit ratings. The industry acquired everyones credit ratings, did some data mining, and found some correlation; the lower the insureds credit rating, the higher the insurance claims.

When state Insurance Commissioner Mike Kreidler rightfully banned this practice as flawed and unethical, the insurance industry moved to sustain profit margins by shifting the lost revenue to customers with good credit ratings (including me). The resultant premium increases represent the extent to which the industry was preying on those with poor credit scores. This response by the industry is not the commissioners fault.

Imagine if you were having credit problems, then saw your premiums go through the roof as a direct consequence. Talk about kicking people when theyre down. Can we do better than this as a society? Can we question a predatory corporate agenda?

Insurance is essentially a humanitarian pact; a community of people voluntarily contributing to a pool as a means of rescue for those struck by misfortune. In years past, insurance was largely a nonprofit industry; how has this benevolent social institution evolved into an exploitative, for-profit behemoth?

Continue reading here:

Letter: Insurance industry is exploitative - The Columbian

Read More..

To Give Away your Life Savings, Press One – Global Banking And Finance Review

By Barry Tuffs, Sales and Marketing Director at Invosys

Caller identity fraud

I am sure each one of us will either have directly experienced a fraud attack or know somebody close who has been a target. Attacks of this nature can range from a single unrecognised transaction on a credit card or a dubious claim on an insurance policy, right through to a full-on emptying of a bank account. Thankfully, in many instances, it is the provider who ultimately incurs the loss, but not without significant disruption for the victim. In every case, the victim will be left scratching their head, wondering where they exposed their details to the criminals or which of their past transactions was used to harbour the information.

While these criminal occurrences appear to be a one-time hit-and-run event, it is often far more than a straightforward data breach that enables highly organised gangs to commit the fraudulent act. The mining and piecing together of the victims data can take many months and thousands of attempts to gather the information necessary to carry out the attack successfully.

Data mining

Data mining, or data farming, typically begins with a snippet of information that becomes available either in the public domain or for a fee on the Dark Web. This information may have been released from a previous mass data breach or from details gained via an unscrupulous third party. But wherever the details came from, they are unlikely to be sufficient to commit fraud. It is not a difficult task to use the various social media channels to discover somebodys date of birth, pets name, mothers maiden name, childrens names and birthdays all among many other details people tend to incorporate into passwords or set as answers to their security questions.

However, we have all had texts, emails and voice messages alerting us to activity on an account or with an agency we have no association with.

The fraudsters send out these alerts across various mediums, sometimes with a scatter-gun approach, hoping that the random recipient opens the message and clicks the link that takes them through to a web page or data capture form purporting to be associated with an organisation they have a relationship with. Here, the sole aim is to obtain as much personal information as possible by the victim disclosing it in full.

Yet, it is likely that the alert message was not completely random. A contact number or email address may have been leaked along with the client reference (account number or customer code). These messages requesting a call to action can be far more targeted. Messages from several similar organisations are sent over a period to target the victims using different methods. If a potential victim responds to one message and not others, the fraudsters can creep closer to knowing where to focus their efforts.

Criminal gangs often use their target organisations interactive voice response (IVR) or telephony menu as their tool of choice.

The self-service systems allow the fraudsters to go about their data mining totally unnoticed. Multiple attempts can be made to enter a valid customer ID number or account code without the victim ever becoming suspicious. Of course, some systems can look out for recurring calls from the same number, but the crime syndicates are becoming ever more technically advanced.

Undoubtedly, the move to IP-based telephony has lowered costs, increased resilience and enabled an almost endless list of possibilities, but not without added concerns. Traditionally, enabling a caller to speak to somebody at their desired destination was only possible because of a continuous connection on the copper network between the two specific endpoints. As more modern technology effectively uses the internet to transmit phone calls, there is far more going on than the simple passing of sounds from end to end. Before the call connects, certain criteria need to be met to satisfy both the networks and the end devices. The criteria are verified within the data element of the call, like a kind of digital footprint.

Readily available technology now exists to manipulate the ingrained data, altering the very core of the call. As a direct result, fraudsters can present a different telephone number with every call they make, even if it originates from the same device. They can even go as far as presenting a genuine customer telephone number, which may be all the proof the organisation needs to pass the first line of security and gain access to basic client information or the next set of virtual locks. Changing the presentation number of a call in this way, when done for genuine reasons, is known as CLI Flexing. Instances of presenting different numbers with deceitful motivations are known as spoofing and it happens alarmingly frequently.

An increasing problem

During the pandemic, many businesses had to change the way they operate, with many departments working from home or even closing with employees on furlough. Potentially, this shift to remote working drives more incoming enquiries into businesses automated systems. Many companies will choose to retain their new practices to reduce the size of their workforce and lower ongoing costs. Unfortunately, higher call traffic and automation has given the criminal groups even more cover to go about their business. If call volumes have increased anyway, organisations will be oblivious as to whether the increase is from genuine callers or thanks to calls of a less desirable nature.

Have you heard of the infinite monkey theory? This hypothesis says that if you give enough monkeys a typewriter each, one will (eventually) inadvertently write the full workings of William Shakespeare. Many others will come close, perhaps with just a single spelling mistake. It is a similar challenge with fraudsters. If they make enough attempts to an unmonitored IVR system, they will eventually get a correct combination. The fraudsters do, however, have a head start, as they only have ten digits at their fingertips rather than twenty-six letters (plus punctuation). By removing any combinations that are known to be invalid, the target becomes easier to locate.

Automated diallers will be doing the vast majority of the monkey work and will be programmed to identify the different IVR responses for recognised numbers. This work determines with which institute or business the initial pieces of information are associated. It is not uncommon for an automated system to give out an account balance or order status update based on the callers number being recognised, along with a valid account code or client ID entered on the keypad. All this information helps to piece together the jigsaw of where and when to focus the efforts of the fraudsters. The last thing the fraudsters want at this stage is to be put through to an actual agent. They are happy camping out in the IVR, untangling the data.

It could be months later when the actual fraud causes a loss to take place, but there are scenarios where the fraudsters can act much quicker.

Have you ever had one of those calls with the digitised voice, asking you to press one to be connected to your bank? I always hang up but do often wonder what would happen if I did press the relevant button. My guess is that I would be asked to enter a security number using the phones keypad and somebody, or something, would record the tones and decipher my code. However, there is a chance I would be connected to the genuine organisation and its automated menu system, albeit not directly. There is a reasonable chance I would not notice anything amiss.

The reality is that I may have just been connected to a three-way call, where the fraudster is already on a call within my providers IVR. Once connected, the fraudster sits silently listening to me key in my security codes and answer my ID checks. Then, just as I am being connected to the right department, the fraudsters disconnect my leg of the call, leaving them to speak to the agent and do whatever they like, such as change my PIN, reset my online password or transfer a large amount of funds. The criminals will call me back (do not forget they can present any number they choose to), apologise for the call dropping and tell me there is nothing to worry about, before wishing me a good day.

Although this type of crime is more prevalent within the financial sector, there are many other industries where fraudulent phone calls will be occurring. But how many and how often is incredibly hard to say.

Two factors combine to impede quantifying IVR fraud. Firstly, there is the fact that any attack on the IVR usually precedes the actual fraudulent transaction, which could have been the result of hundreds of mining attempts. So, any data analysis is retrospective and potentially ambiguous.

Secondly, any organisation affected by IVR fraud will be extremely reluctant to publicise facts and figures. The Telecommunications UK Fraud Forum (TUFF) suggests that affected businesses should share best practices and highlight their own weaknesses to other similar businesses. TUFF also recognises that admitting to these shortcomings could be the worst kind of publicity, so many businesses will keep their findings to themselves.

As an ever-increasing number of companies strive to minimise their costs and working remotely becomes the new norm, the IVR and connected automated services will only continue to grow. It is, therefore, imperative that businesses and their customers have the utmost faith in the technology they are accessing or providing.

Why should my business care?

Whilst this type of activity is most prevalent in the financial sector, any business operating a telephone system could be a target. The opportunities for thieves to prosper from presenting themselves are endless.

On the 25th of May 2018, the EUs GDPR regulations came into play, making organisations take much more accountability for how they handle any customers personal information. Personal data is described as follows:

Name

Home address

Email address

Bank details

Medical information

A computers IP address

So, if your business holds any of that information about a customer and it is distributed over the phone, whether automatically or by an employee, you would be breaking the law if it is given to an imposter.

The laws state that any data breach must be disclosed by the affected organisation within 72 hours of being made aware of the contravention. Of course, there is the ability to plead ignorance as you could be unaware for an undefined period, or even indefinitely. But consumers are far less likely to do business with an organisation that is non-compliant.

Any business found to be in breach of the rules faces potential penalties of 4% of their turnover or 20 million.

This kind of fraudulent activity has serious implications for individuals and organisations alike. It is big business for criminal gangs. How big? Nobody really knows.

Thankfully, whilst fraudsters may be creative and bold, they are also often lazy. They will always go for the easiest of wins. Which is why the scam emails we all receive usually contain spelling errors or grammatical mistakes that are obvious to most people. They do not want everyone to respond and waste their own time taking a target down a route that they will eventually realise is not what it seems. They want the more easily led. It is for this reason fraudsters choosing the path of least resistance that organisations operating phone systems need to be aware of this type of activity and look for ways to combat it.

To find out how to tackle these issues through Invosys,BOOK A DEMOwith us.

Go here to read the rest:

To Give Away your Life Savings, Press One - Global Banking And Finance Review

Read More..

SOS Reports Progress on the Construction of Its North American Super-Computing and Hosting Center – PRNewswire

QINGDAO, China, Nov. 9, 2021 /PRNewswire/ -- SOS Limited (NYSE:SOS) (the "Company" or "SOS") reported the status of Phase I construction of its supercomputing and hostingcenter in North America. The center is located in Marinette county Wisconsin, a state with rich natural resources and renewable energy.

SOS has been actively expanding its global footprint during the past year or so. The total power at the Wisconsin center isexpected to be 50MW, fueled by renewable power and grid power. The Wisconsin facility is projected to have a total BTC hash power of 1,000 PH once in full capacity of operation. Phase I of the center is projected to use up to 20MW 17 units of mobile smart data center are equipped for this purpose. At present, 6 units of mobile smart data center have arrived in Wisconsin. Another 11 units mobile smart data center are in transits and are expected to arrive around December 2021.

Mr. Yandai Wang, CEO and Chairman of SOS, commented, "the supercomputing and hosting center in Wisconsin is an important part of SOS's efforts to create its own blockchain technology based ecosystem. We look forward to launching our Super-Computing and Hosting service business in Wisconsin in the first quarter of 2022.

About SOS Limited

SOS is an emerging blockchain-based and big data-driven marketing solution provider, with a nationwide membership base of approximately 20 million inChina. SOS is also engaged in blockchain and supercomputing operations, and may expand into.cryptocurrency security and insurance in the future. SinceApril 2021, SOS launched commodity trading via our subsidiary SOS International Trading Co. Ltd. The core infrastructure of SOS' marketing data, technology and solutions to insurance and emergency rescue services is built on big data, blockchain-based technology, cloud computing, AI, satellite, and 5G network, etc. SOS has created a cloud "software as a service (SaaS)" platform for emergency rescue services, with three major product categories: basic cloud, cooperative cloud, and information cloud. This system provides innovative marketing solutions to clients such as insurance companies, financial institutions, medical institutions, healthcare providers, auto manufacturers, security providers, senior living assistance providers, and other service providers in the emergency rescue services industry. For more information, please visit:http://www.sosyun.com/

Forward-Looking Statements

Certain statements in this press release may constitute "forward-looking statements" within the meaning of the federal securities laws, including, but not limited to, our expectations for future financial performance, business strategies or expectations for our business. These statements constitute projections, forecasts and forward-looking statements, and are not guarantees of performance. SOS cautions that forward-looking statements are subject to numerous assumptions, risks and uncertainties, which change over time. Words such as "may," "can," "should," "will," "estimate," "plan," "project," "forecast," "intend," "expect," "anticipate," "believe," "seek," "target," "look" or similar expressions may identify forward-looking statements. Specifically, forward-looking statements may include statements relating to the Company's:

These forward-looking statements are based on information available as of the date of this press release and our management's current expectations, forecasts and assumptions, and involve a number of judgments, risks and uncertainties that may cause actual results or performance to be materially different from those expressed or implied by these forward-looking statements.

These risks and uncertainties include, but not are limited to, the risk factors described by SOS in its filings with the Securities and Exchange Commission ("SEC"). These risk factors and those identified elsewhere in this press release, among others, could cause actual results to differ materially from historical performance and include, but are not limited to:

Accordingly, forward-looking statements should not be relied upon as representing our views as of any subsequent date, and you should not place undue reliance on these forward-looking statements in deciding whether to invest in our securities. We do not undertake any obligation to update forward-looking statements to reflect events or circumstances after the date they were made, whether as a result of new information, future events or otherwise, except as may be required under applicable securities laws.

SOURCE SOS Limited

Read more:

SOS Reports Progress on the Construction of Its North American Super-Computing and Hosting Center - PRNewswire

Read More..

AdGuard is an ad blocker, a VPN and a security app in one — and this deal makes it a steal! – Cult of Mac

AdGuard combines a potent ad blocker with the best privacy and security features of a virtual private network and a parental-control app. And right now, you can get a lifetime subscription to the AdGuard Family Plan for only $30. Plus, to make this deal even sweeter, it comes with $20 in store credit to spend on other Cult of Mac Deals!

So, basically, 10 bucks for a lifetime of ad-free web browsing with additional privacy and security benefits (and $20 to spend on something else to make your life more joyful and carefree).

AdGuard is unique in that it brings together many of the best security features of different essential programs and apps. It covers up to nine devices, and it works on Mac, iOS, Windows and Android.

So, what does AdGuard bring to the web-browsing party? First, it will get rid of all those annoying advertising banners and pop-ups. Not to mention those long, unskippable ads at the beginning of YouTube videos that end up being longer than the video itself. Kiss those goodbye!

You will gain some peace and quiet now that you dont have to track down which tab has an ad that plays music. And as a bonus, your pages likely will load more quickly as well. Now that your bandwidth isnt bogged down loading a banner selling a product you googled yesterday, you should notice a real uptick in your web-browsing speed.

Privacy is important, too, and AdGuard gives you powerful tools for maintaining yours. AdGuard lets you hide your personal info from trackers and data miners. (Thats the companies and people who would use your browsing data to create ads that you blissfully cant see one youre running AdGuard.) You can even protect yourself from malware attacks and phishing attempts.

Finally, while your security is important, your childrens is absolutely essential. And you can protect your kids while theyre on the internet by using AdGuards parental controls. You can restrict inappropriate and adult content from appearing while your kid is browsing.

With AdGuard, you will give your family the best version of the internet: One that is free of ads, free of data mining and free of suspicion. Get an AdGuard Family Plan: Lifetime Subscription + $20 Store Credit for $29.99 (regularly $129).

Prices subject to change.

See the original post here:

AdGuard is an ad blocker, a VPN and a security app in one -- and this deal makes it a steal! - Cult of Mac

Read More..

These 4 Measures Indicate That Hut 8 Mining (TSE:HUT) Is Using Debt Reasonably Well – Simply Wall St

Some say volatility, rather than debt, is the best way to think about risk as an investor, but Warren Buffett famously said that 'Volatility is far from synonymous with risk.' So it might be obvious that you need to consider debt, when you think about how risky any given stock is, because too much debt can sink a company. We note that Hut 8 Mining Corp. (TSE:HUT) does have debt on its balance sheet. But the more important question is: how much risk is that debt creating?

Debt is a tool to help businesses grow, but if a business is incapable of paying off its lenders, then it exists at their mercy. In the worst case scenario, a company can go bankrupt if it cannot pay its creditors. However, a more common (but still painful) scenario is that it has to raise new equity capital at a low price, thus permanently diluting shareholders. By replacing dilution, though, debt can be an extremely good tool for businesses that need capital to invest in growth at high rates of return. The first step when considering a company's debt levels is to consider its cash and debt together.

See our latest analysis for Hut 8 Mining

As you can see below, Hut 8 Mining had CA$10.3m of debt at September 2021, down from CA$26.7m a year prior. But it also has CA$226.9m in cash to offset that, meaning it has CA$216.6m net cash.

Zooming in on the latest balance sheet data, we can see that Hut 8 Mining had liabilities of CA$21.9m due within 12 months and no liabilities due beyond that. On the other hand, it had cash of CA$226.9m and CA$111.7m worth of receivables due within a year. So it can boast CA$316.7m more liquid assets than total liabilities.

This short term liquidity is a sign that Hut 8 Mining could probably pay off its debt with ease, as its balance sheet is far from stretched. Succinctly put, Hut 8 Mining boasts net cash, so it's fair to say it does not have a heavy debt load!

Although Hut 8 Mining made a loss at the EBIT level, last year, it was also good to see that it generated CA$31m in EBIT over the last twelve months. When analysing debt levels, the balance sheet is the obvious place to start. But ultimately the future profitability of the business will decide if Hut 8 Mining can strengthen its balance sheet over time. So if you're focused on the future you can check out this free report showing analyst profit forecasts.

But our final consideration is also important, because a company cannot pay debt with paper profits; it needs cold hard cash. Hut 8 Mining may have net cash on the balance sheet, but it is still interesting to look at how well the business converts its earnings before interest and tax (EBIT) to free cash flow, because that will influence both its need for, and its capacity to manage debt. Over the last year, Hut 8 Mining saw substantial negative free cash flow, in total. While that may be a result of expenditure for growth, it does make the debt far more risky.

While it is always sensible to investigate a company's debt, in this case Hut 8 Mining has CA$216.6m in net cash and a decent-looking balance sheet. So we are not troubled with Hut 8 Mining's debt use. The balance sheet is clearly the area to focus on when you are analysing debt. However, not all investment risk resides within the balance sheet - far from it. Case in point: We've spotted 3 warning signs for Hut 8 Mining you should be aware of, and 2 of them are significant.

Of course, if you're the type of investor who prefers buying stocks without the burden of debt, then don't hesitate to discover our exclusive list of net cash growth stocks, today.

This article by Simply Wall St is general in nature. We provide commentary based on historical data and analyst forecasts only using an unbiased methodology and our articles are not intended to be financial advice. It does not constitute a recommendation to buy or sell any stock, and does not take account of your objectives, or your financial situation. We aim to bring you long-term focused analysis driven by fundamental data. Note that our analysis may not factor in the latest price-sensitive company announcements or qualitative material. Simply Wall St has no position in any stocks mentioned.

Have feedback on this article? Concerned about the content? Get in touch with us directly. Alternatively, email editorial-team (at) simplywallst.com.

View post:

These 4 Measures Indicate That Hut 8 Mining (TSE:HUT) Is Using Debt Reasonably Well - Simply Wall St

Read More..