Page 2,805«..1020..2,8042,8052,8062,807..2,8102,820..»

A better way to fight fraud with data analytics – Reuters

A page from the PPP loan application for financial support due to the outbreak of COVID-19 in New York. May 7, 2020. REUTERS/Lucas Jackson

In order to keep the US economy afloat during the COVID-19 pandemic, more than $4 trillion was pumped into the economy through various government programs. The money had to be distributed as quickly as possible, so in just a matter of weeks, pandemic stimulus checks were sent, new emergency loan programs such as the Paycheck Protection Program (PPP) and others started processing loans by the thousands and applications for unemployment compensation skyrocketed.

Check out all the articles in the latest issue of .

Fraudsters know a good opportunity when they see one. Almost instantaneously, fictitious businesses began applying for PPP loans; bogus websites started selling fake or nonexistent Personal Protective Equipment; and thousands upon thousands of people tried to collect unemployment checks in any way they could through synthetic identities, stolen Social Security numbers, shell company shenanigans and more.

In 2020, the US Department of Justice reclaimed $360 million in fraud related to the Coronavirus Aid, Relief, and Economic Security (CARES) Act, but hundreds of additional cases are currently under investigation, and the Small Business Administrations Inspector General (SBA IG) has reported receiving tens of thousands of fraud tips. By comparison, the total number of fraud tips the SBA IG received in 2019 was 800.

Considering that the federal government is preparing to inject another $1.9 trillion into the US economy in 2021, it is perhaps unsurprising that Thomson Reuters 2021 Government Fraud, Waste, and Abuse Study found that 93% of frontline government administrators at the state and local level expect fraud in 2021 to be the same or worse as in 2020.

The same in this case may not sound all that bad, but it is really quite alarming. Indeed, it would mean that government employees will continue to be overwhelmed and have insufficient resources and inadequate technology to do their jobs. Further, billions of taxpayer dollars will land in the hands of criminals worldwide, and thousands of American citizens in need of assistance will not receive it.

A worse scenario is hard to imagine, but more than half of government employees surveyed in the report said thats precisely what they expect in 2021.

Attack of the cyber-gangs

Government administrators often get a bad rap, but to be fair, they faced an almost impossible task last year. When the shutdowns began in March 2020, more than 32.5 million people filed for unemployment within the first two months of the pandemic, and administrators handling those claims were processing an average of 10 to 15 times their normal workload. In order to distribute unemployment funds as quickly as possible, controls had to be relaxed, which not surprisingly created a golden opportunity for fraudsters.

Even in the best of times, however, most government agencies are using outdated technology to fight a class of criminals that is getting smarter and more technologically sophisticated by the day. Almost two-thirds of government employees said their most pressing issues were budget constraints and lack of resources, the report noted. Only half of those respondents said they felt confident they had adequate resources to fight fraud, waste and abuse, and 45% said their primary tool for screening new vendors and contractors was a simple Google search.

Clearly, government administrators do the best they can with the resources they have but most of the technology available to them is incapable of detecting or preventing fraud before a great deal of money already has been stolen. Indeed, most fraud-prevention efforts are focused on investigations after a suspected fraud scheme has been uncovered and the stolen funds are long gone.

The power of data analytics

Most government agencies rely on anonymous tips, whistleblowers and alert administrators to identify suspicious patterns of behavior that may indicate fraud. The problem with that approach is that program administrators dont necessarily know what to look for, dont have enough time to devote to fraud prevention and arent technologically equipped to identify anything but the most common and egregious indications of fraud.

Behavioral analytics, a discipline that can be applied very effectively to identify patterns of fraudulent behavior that might otherwise go undetected, is a growing specialty among fraud investigators. For example, when sophisticated fraudsters target unemployment benefits, they dont create one or two bogus applications they flood the system with hundreds or thousands of fake applications in the hope that someone will slip up and send them money. But if, say, 6,000 applications use the same address or P.O. box (which is not uncommon), a system equipped with the proper analytical tools can easily flag the anomaly and send an alert.

Take another example: Suppose it takes an average of eight minutes to fill out an unemployment application online, and a flood of applicants suddenly start filling out the form in 30 seconds. Again, behavioral analytics can identify and alert authorities to such a deviation from the norm well before any human observer might catch on.

In actual practice, properly programmed data-mining software can identify all sorts of suspicious or anomalous patterns that an overworked, under-equipped administrator might never detect. Further, the software can run 24/7 in the background or be integrated with a case-management system to identify trends and patterns affecting the program, providing an extra layer of security. Unfortunately, almost two-thirds of state and local government employees dont use any kind of matter-management software or analytics to help them prevent fraud, according to the report.

The question is: Why?

A more cost-effective option: preventive analytics

Its no secret that preventive fraud measures are more cost-effective than after-the-fact investigation. For years, the US Government Accountability Office as well as industry groups like the Association of Certified Fraud Examiners (ACFE) have been issuing reports on best practices for fraud risk management, where the benefits of using proactive analytics as part of a dedicated fraud-prevention program are almost always highlighted. In fact, a 2018 ACFE report estimated that risk-assessment programs using proactive data analytics had reduced fraud losses by more than 50%.

Given that the US Treasury may end up pumping more than $2 trillion into the economy in 2021, and fraudsters already have had a year to test vulnerabilities in current government systems, its a fair bet that billions more will be lost in the pandemic shuffle.

A modest investment in data analytics could save some of this loss. It could also give government administrators on the front lines of the pandemic crisis a fighting chance against criminal opportunists who view government benefit programs as their own personal ATM.

Opinions expressed are those of the author. They do not reflect the views of Reuters News, which, under the Trust Principles, is committed to integrity, independence, and freedom from bias. Thomson Reuters Institute is owned by Thomson Reuters.

Jon Coss is Vice President in Risk, Fraud & Compliance at Thomson Reuters, where he manages Pondera Solutions, which Thomson Reuters acquired in March 2020. Coss has spent the last 26 years working with government agencies to improve operations and decision-making through the use of analytics technologies.

See original here:

A better way to fight fraud with data analytics - Reuters

Read More..

Federal procurement fraud occurs more often than you might think – Federal News Network

Best listening experience is on Chrome, Firefox or Safari. Subscribe to Federal Drives daily audio interviews onApple PodcastsorPodcastOne.

One might be surprised to learn the FBI has opened more than two dozen grand jury investigations this year alone related to federal contracting fraud. Its Procurement Collusion Strike Force is using some up to date techniques like data mining for contractors honest ones, that is it all means the need for strong compliance programs. For more,Federal Drive with Tom Temin spoke to Jon Jacobs and Alex Canizares, partner and senior counsel, respectively, from the law firm Perkins Coie.

Tom Temin: And lets begin at the beginning here, and tell me a little bit about this phenomenon of contracting fraud. Is this mostly something that happens with collusion among contractors? Or is it something that happens between the government and contractors as a rule?

Jon Jacobs:Yeah, the kind of fraud were talking about here, Tom, is contractor-to-contractor collusion. So what the Strike Force is focusing on is bid rigging, price fixing or market allocation among contractors who are bidding for federal contracts. They will get together beforehand, and they will decide who is going to win a particular bid, the one whos going to submit a higher or complimentary bid will know what the prearranged winner is going to bid. And so its all set up so competition is eliminated. The agency, the federal government is not involved. So this is very different than say kickbacks to federal contractors in order to steer contracts a certain way.

Tom Temin:Sure. And then I guess, for the contractors involved, the ones who agree to lose then get some sort of consideration, I guess, for the winners in general?

Jon Jacobs:They do. These bid-rigging conspiracies are often set up so that if Alex and I are the two natural bidders for a contract, well get together and Ill say, Alex, let me have this one, please bid above this certain price, and the next ones yours.

Tom Temin:And I guess the question is, how often does this happen? I mean, theres a couple of dozen out of what 15- 20,000 contracting actions a year and 2,000 of them roughly are protested. I mean, this is a big business. So I guess Im asking in general, is the system in the United States corruption-free with exceptions? Or is it tend to be maybe the noncorrupt ones are the exceptions?

Alex Canizares: According to the FBI, which issued a report in March of this year, this is a significant issue. They cite a study that says that about 20% of procurement is tainted by some sort of bid rigging. And whether or not that study is true, if you think about $500 billion-plus of federal procurement activity every year, this is something that is going to have a significant impact. And this Procurement Collusion Strike Force recognizes that, kind of renews the focus that the law enforcement community has.

Tom Temin:By the way, your numbers a little out of date during the pandemic, it was more like $639 billion. So theres a lot of room for collusion I guess, drug companies and mask companies or whatever. And is it generally more on to the extent we know, on the DoD side or the civilian side?

Alex Canizares:Well, its really everything. I mean, I think the areas of focus for this particular Interagency Task Force include Defense. There was just another indictment announced last week in the Defense context, but also health care. And you mentioned the pandemic, and I think the significant increase in federal spending and response to the pandemic heightens the concern. And its not specific to COVID but if you think about infrastructure, thats another area I think well see renewed focus on, especially with talks underway about increased spending on transportation and infrastructure. But really, its not agency-specific, its not just DoD. These are many, many law enforcement agencies, and inspectors general and different agencies that are now on heightened alert for this issue.

Tom Temin:And, Jon, you did have experience in the Justice Department earlier in your career. Is there any clue that a contracting officer can discern that might tip him or her off that somethings un-kosher going on here?

Jon Jacobs:Yes. And actually, the Antitrust Division as a part of this new initiative has published the so-called red flags of collusion on their website. And the red flags are designed for contracting officers to know what to look for. Its not completely comprehensive, but some of the examples are, are there a small number of bidders for this particular kind of contract? Because obviously, its easier to collude if you dont have a large number. Are there similar-looking bid proposals? Is there similar handwriting, similar typographical errors? Does it look like the different bids were prepared by the same person because believe it or not, sometimes these conspirators arent careful enough. And its very suspicious when you lay them all out in the table. And then take a look at the patterns not only the prices, but the patterns of winning. As I said before, the way these bid rigging conspiracies usually work is, if Alex and I are supposedly competing, were rotating. And so if it looks like Alex is winning about 50%, Im winning about 50% thats a red flag.

Tom Temin:Sounds like high school construction contract. Were speaking with Jon Jacobs and Alex Canizares. They are partner and senior counsel at the law firm Perkins Coie. And tell us more about the FBI task force. Its an interagency affair. Whos involved and maybe a little bit about the data mining and data experts theyve gotten on board?

Alex Canizares:Well, its not just the FBI, its actually led by the Antitrust Division within the Department of Justice. FBI is a principal law enforcement agency thats involved. But youve actually got a total of 29 either U.S. attorneys offices or agencies, and that includes the inspectors general who already have their own oversight function looking for this sort of conduct. I do want to mention one aspect of the red flags, which is important here, too, which is contracting officers that conduct competitive procurements are already required by statute and regulation to be on the lookout for this sort of antitrust activity. And so when they are reviewing contract proposals in a procurement, theyre already supposed to notify the Department of Justice for this sort of thing. What this particular task force does, is really two things. One is bring new cases. And the other part is really bring about more awareness, educate people, and train people, and theyve done a significant amount of training in that regard.

Tom Temin:Alright, so lets get to some of the advice your law firm has put forth for contractors that dont want to be seen as doing this. And also, I guess theres the situation where it could occur because of some employees, but you can protect the corporation, even if those people get punished and go to jail somehow. So what should contractors do to stay out of this?

Jon Jacobs:Yeah, the very first thing I would advise is to update your compliance program. That is particularly important for avoiding any kind of antitrust offense and particularly recently, given some DOJ guidance, and theres at least a couple of reasons for this. I mentioned the so-called leniency program and then Alex, maybe you can describe the recent availability of deferred prosecution agreements that are available to those with otherwise effective compliance programs. So the Antitrust Division has a leniency program. And what that is, is if you are the very first individual or company to notify the Antitrust Division of a conspiracy that it has not heard about before, you get complete immunity. You will not be charged, you wont be fined, your executives wont go to jail. Remember, the antitrust laws do involve jail terms, potentially, for executives that participate in this activity. Now, youre still going to have to cooperate and that can be quite an effort. Youre going to have to hire a lawyer, unfortunately, youre going to have to proffer your facts of your internal investigation, youre going to have to produce documents and make your executives available for an interview with the criminal prosecutors. But its also available only for the first to contact the DOJ. There is a race for leniency. So its important if you see something right away, say something.

Tom Temin:Is there, by the way, any qui tam possibility for someone that might be lower down in the company that blows the whistle on this?

Jon Jacobs:There absolutely is and some of my criminal cases started with a qui tam complaint.

Tom Temin:Got it, okay and what else?

Alex Canizares:Well, one of the things that contractors can really do to kind of mitigate the risk of this sort of enforcement activity is to, as Jon says, build a robust compliance program, have those internal controls in place, but also be specifically aware of the risks that the DOJ is looking at. These same red flags of collusion are things that companies within their own company can sensitize their employees to. Thats the procurement folks, thats the people who are doing the business development and that sort of thing. And it also means having a very specific reporting mechanism. So if people see something, they can bring it to the attention of the appropriate person. The False Claims Act, in terms of qui tam is another aspect of this. Its not particularly within the purview of this program. But its certainly reasonable to expect that if people are identifying potential fraudulent activity that could result in a False Claims Act matter.

Tom Temin:Alright, and a couple of lightning round questions here at the end, does this tend to be as far as you can tell more in the services or in the products acquisition area?

Alex Canizares:I would say its not limited to either one. I think that the areas that were looking at now, in terms of recent announcements, we had one very recently in the infrastructure sector that was more service oriented. But really, I think theres likely to be cases on both sides of that fence.

Tom Temin:And the second question is, more and more contracting dollars are going through government wide acquisition contracts as GWACs as task orders, as opposed to full an open. And so is it more an occurrence in full and open competition, or do you find it in the GWAC task orders also?

Alex Canizares:Its an interesting question. I dont think its off the table in terms of a GWAC context. I mean, as you say, there are situations and its not limited to the GWACs but where sole source contracting is perfectly permissible. The concern in this particular area is where competition is required. And I think thats where companies, particularly if theyre engaged in teaming arrangements, need to be very sensitized to what the risks are.

Tom Temin:Alex Canizares is senior counsel at the law firm Perkins Coie, thanks so much.

Alex Canizares:Thank you.

Tom Temin:And Jon Jacobs is a partner there. Thank you very much.

Jon Jacobs: Thank you, Tom.

Go here to read the rest:

Federal procurement fraud occurs more often than you might think - Federal News Network

Read More..

NASA’s Mars helicopter Ingenuity could keep flying the Martian skies for months – Space.com

The future of aerial Mars exploration looks bright.

NASA's Mars helicopter Ingenuity, which landed inside Mars' Jezero Crater with the agency's Perseverance rover in February, has now completed eight Red Planet flights. That's three more than the maximum targeted for the 4-lb. (1.8 kilograms) chopper's original technology-demonstration mission and Ingenuity isn't done yet.

The little rotorcraft's current extended-mission activities, which center on showcasing the potential of Mars helicopters to serve as scouts for rovers, will "continue for at least a few more months, with a cadence of a couple of flights a month," Perseverance project scientist Ken Farley, a geochemist at the California Institute of Technology in Pasadena, said last Monday (June 21) during a webcast meeting of NASAs Mars Exploration Program Analysis Group (MEPAG).

Video: Watch NASA's Mars helicopter Ingenuity fly in 3D

Balancing the needs of a helicopter and rover mission simultaneously requires a complicated "dance," and the upcoming Ingenuity flights will give members of both teams valuable practice, Farley said. (Ingenuity and Perseverance are separate missions, but the helicopter relies on the rover which is just now digging into its life-hunting, sample-gathering work as a communications relay.)

"Along the way, we hope to acquire reconnaissance imagery of places that we cannot go," Farley said. "And we are also using the helicopter to develop terrain meshes that could, in the future, allow rovers to drive across landscapes that they cannot actually see from their mast-mounted cameras."

To date, the farthest distance that Ingenuity has traveled on a single sortie is 873 feet (266 meters; achieved on Flight 4, on April 30), and the longest it has stayed aloft is 140 seconds (Flight 6, May 22). The Ingenuity team would like to shatter both of those marks in the next few months, if possible.

"We've gone 266 meters; we're looking to stretch that to a kilometer [0.6 miles]," Ingenuity operations lead Teddy Tzanetos, of NASA's Jet Propulsion Laboratory (JPL) in Southern California, said during the MEPAG meeting on June 21.

"That would mean three minutes flight time total," Tzanetos said. "And that would really be pushing the limits of what the technology demonstrator is capable of, in terms of a flight vehicle."

The helicopter team will also prioritize scouting regions of interest to Perseverance, such as the geologic unit on the floor of Jezero known as Stah, and mining the reams of scientific and engineering data generated by Ingenuity, Tzanetos added.

The data-mining work could inform the design of Ingenuity's successors, which are already starting to take shape as concepts at least. For example, engineers have begun drawing up plans for a much larger, much more capable rotorcraft called the Mars Science Helicopter, Tzanetos said during his MEPAG talk.

The Mars Science Helicopter is a joint project involving JPL, NASA's Ames Research Center in Silicon Valley and the defense contractor AeroVironment. The envisioned craft would sport six rotors, weigh about 66 lbs. (30 kilograms) and be able to carry science payloads weighing up to 11 lbs. (5 kg) or so, Tzanetos said. (Those are the weights here on Earth; the hexacopter would be lighter on Mars, whose gravity is just 38% as strong as our planet's.)

The Mars Science Helicopter would be capable of flying about 6.2 miles (10 kilometers) in a single sortie, Tzanetos said. Such an aircraft would be able to explore "locations that rovers couldn't access, like cliffside walls, or difficult-to-traverse terrains, or even down into caves," he said.

Again, the Mars Science Helicopter is just a concept at the moment, not a full-fledged mission. But thanks to Ingenuity's ongoing work, the hexacopter might find its way to the Red Planet at some point in the not-too-distant future.

Mike Wall is the author of "Out There" (Grand Central Publishing, 2018; illustrated by Karl Tate), a book about the search for alien life. Follow him on Twitter @michaeldwall. Follow us on Twitter @Spacedotcom or Facebook.

Originally posted here:

NASA's Mars helicopter Ingenuity could keep flying the Martian skies for months - Space.com

Read More..

Will All End Well for This Popular Reddit Biotech? – Motley Fool

On June 28, shares ofCel-Sci (NYSEMKT:CVM) plunged nearly 70% peak-to-trough before recovering. The reason behind the wild price action couldn't be more obvious -- the company's pivotal phase 3 study involving its Multikine immunotherapy did not meet its primary endpoint of improving the overall survival (OS) of head and neck cancer patients.

Cel-Sci had been extremely popular among traders of the r/WallStreetBets community due to its short interest -- standing as high as 24% before the data release. The stock also has a cult following outside of that. There is even a website with detailed instructions on how to make short-sellers cover all of their bets. Is there any hope left for shareholders?

Image source: Getty Images.

Unfortunately (or rather, fortunately, depending on the lens one looks through), it looks like the shorts have won, and the hunters have now become the hunted. Despite the clinical trial lasting 9.5 years, Multikine was unable to demonstrate a 10% benefit in improving patients' OS.

This is the company's flagship drug candidate. Cel-Sci has no product revenues and only around $50 million in liquid assets. By all measures, the stock should be going to zero after the plunge from its $1 billion market cap before the data readout.

It took over a year for results to come out after the trial finished. In retrospect, that gave the company ample time to data-mine and look for "potential" therapeutic signals.

Via a post-hoc subgroup analysis, the company uncovered that patients who received Multikine followed by surgery and radiotherapy, but not chemotherapy, had an OS improvement of 14.1% after five years, compared to those who just received surgery and radiotherapy. The survival benefit disappeared after accounting for patients who also received chemotherapy. Based on this, the company anticipates that it can meet regulatory requirements for a Biologics Licensing Application (BLA) submission.

If the data mining here seems confusing, consider this analogy. A political candidate lost in the midterm elections. Instead of acknowledging defeat, he instead cites data from one sub-district that overwhelmingly voted for him as evidence that he actually "won."

Let's think about Cel-Sci's story for a minute. Its plan to seek approval for Multikine effectively suggests that patients would need to forgo chemotherapy for Multikine to have a significant effect. I do not think that the U.S. Food and Drug Administration (FDA) could ever approve a drug based on such a scheme, but Cel-Sci is going ahead with its FDA filing anyway.

The stock has attracted a huge meme following, and it has not tanked to single digits after the disappointing data readout. Some investors probably moved all-in and are hoping for a good river card (the FDA submission) to complete a busted hand (reverse their fortunes).

At this point, however, it's almost a given that Multikine will go nowhere. The data says it all. In addition, while the Multikine trial was still ongoing, next-generation immunotherapy checkpoint inhibitors like Opdivo and Keytruda entered the market. In the case of the former, it reduced the risk of death in patients with head and neck cancer by 30%. On a side note, it did not take a decade for Opdivo to achieve that efficacy. All of this makes it pretty clear that for investors thinking about the long term, Cel-Sci is a biotech to avoid.

This article represents the opinion of the writer, who may disagree with the official recommendation position of a Motley Fool premium advisory service. Were motley! Questioning an investing thesis -- even one of our own -- helps us all think critically about investing and make decisions that help us become smarter, happier, and richer.

Read more from the original source:

Will All End Well for This Popular Reddit Biotech? - Motley Fool

Read More..

Business Intelligence: How far and deep can it go to change the way organisations work? – Business Insider India

A wily banker in the mid-1800s made it a point to gain knowledge of political instabilities in Europe and thereby predicted the market. During his time, Sir Henry Furnese became successful and infamous for his corrupt practices. However, his deals were recorded by Richard Millar Devens as a train of business intelligence. You would ask why?

The idea and the concept of using data to gain an advantage over competition, is still in vogue and gaining ground. It has travelled from using data on computers, to floppy disks (where data could travel), to the internet and the cloud. Currently, the BI as it is now called, uses AI and ML to make the reams of data and make it available to decision makers who no longer need to depend on instinct alone.

In spite of the endless promise, a number of BI adoptions have not produced the desired results. This reflects more about the way most traditional businesses work, rather than the technology itself, since most departments within a company refuse to share data, that creates silos, which breaks the philosophy of BI to - democratize data.

The IT departments become proprietary owners of data. To break these walls, the technology too evolved from technical BI to self-service BI wherein sales teams, product development teams, marketing teams access BI for their daily decision making.

Advertisement

The ultimate goal is to enable end-user BI wherein every user can access BI without having to go through an engineering team. The trends in BI that point to end user BI are Auto Narratives where insights/outcomes are delivered in natural language; BI Bots where users can ask and receive insights from specialized bots; mobile analytics which can provide insights all day, all year; Collaborative BI where users collaborate on BI platforms to gain insights; and Data governance which ensure data data quality for unstructured data, informed Abhishek Rungta, Founder and CEO of Indusnet Technologies.

The business of intelligence The magic word that has made BI even more intelligent is AI. The confluence of both technologies is where computer intelligence meets business decision making. It is very important for companies to move and use data. In most cases, 70% of data is never used by companies. There are riches in niches, and data can help you explore those niches or hidden gems within the company in different contexts. Added Abhishek Rungta

The data story needs to make immediate sense. Indus Net Technologies is focusing on predictive analytics, which uses data mining, modeling, and machine learning to determine the probability of future outcomes. With these predictive analytics, healthcare companies are able to deliver personalised healthcare, with focus on individual patients and a greater understanding of trends for larger cohorts.The applications here extend to the financial world too, with banks having greater outlook in designing market specific products, where business performance is predicted to a high degree of accuracy, while delivering a keener understanding of risks involved and preventing fraud. McKinsey, in their Insurance 2030 report predicts that by In 2030, underwriting as we know it today ceases to exist with a majority of underwriting being automated owing to intelligence.

AI and BI can come together to build a truly intelligent business where all its processes are guided data and its management. Apart from capturing data, analyzing it and help create decision making models and empowering employees with data, it can go many steps further. For one, the systems can be taught to learn decision making via machine learning and lead to assisted intelligence that can shift the direction of a business and how it successful it can be.

Go here to see the original:

Business Intelligence: How far and deep can it go to change the way organisations work? - Business Insider India

Read More..

ALPK2 acts as tumor promotor in development of bladder cancer through targeting DEPDC1A – DocWire News

This article was originally published here

Cell Death Dis. 2021 Jul 1;12(7):661. doi: 10.1038/s41419-021-03947-7.

ABSTRACT

Bladder cancer is one of the most common malignant tumors in the urinary system. The development and improvement of treatment efficiency require the deepening of the understanding of its molecular mechanism. This study investigated the role of ALPK2, which is rarely studied in malignant tumors, in the development of bladder cancer. Our results showed the upregulation of ALPK2 in bladder cancer, and data mining of TCGA database showed the association between ALPK2 and pathological parameters of patients with bladder cancer. In vitro and in vivo experiments demonstrated that knockdown of ALPK2 could inhibit bladder cancer development through regulating cell proliferation, cell apoptosis, and cell migration. Additionally, DEPDC1A is identified as a potential downstream of ALPK2 with direct interaction, whose overexpression/downregulation can inhibit/promote the malignant behavioral of bladder cancer cells. Moreover, the overexpression of DEPDC1A can rescue the inhibitory effects of ALPK2 knockdown on bladder cancer. In conclusion, ALPK2 exerts a cancer-promoting role in the development of bladder cancer by regulating DEPDC1A, which may become a promising target to improve the treatment strategy of bladder cancer.

PMID:34210956 | DOI:10.1038/s41419-021-03947-7

See the rest here:

ALPK2 acts as tumor promotor in development of bladder cancer through targeting DEPDC1A - DocWire News

Read More..

Digital transformation is crucial to the future of mining in South Africa – African Mining Market

Mining has played a crucial role in South Africas economy for the best part of two centuries. And while it may not play as big a role as it once did, it still contributed R400-billion to GDP in 2020 and employed more than 450 000 people. But if the sector is to remain competitive at a global level, it has to evolve particularly when it comes to embracing digital transformation.

While South Africas unique circumstances should be taken into account, especially when it comes to factors such as the orebody depth and labour intensity of the countrys mining operations, that doesnt mean that mining companies should shy away from digital transformation. The application of digital technologies, both in their current form and in future digital forms such as artificial intelligence (AI), machine learning (ML), big data analytics, and the Internet of Things (IOT) is increasingly pivotal to mining success. The players in the space which understand that and use these technologies as enablers are the ones most likely to thrive going forward.

Those were the overriding messages at a webinar hosted by Joburg Centre for Software Engineering (JCSE) at Wits University, which included speakers from mining houses, software builders that specialise in solutions for the mining industry, and Huawei.

When we look at mining, what people dont comprehend is that the mining value chain is extremely complex, says Alex Fenn, Head of Technology and Innovation at Sibanye Stillwater. The infrastructure varies from space to space, meaning that achieving digital transformation is far less simple than it would be in a factory, for instance.

That does not, however, mean that it doesnt hold benefits.

Digital transformation is a key enabler to value delivery that is both incredibly specific as well as all encompassing, he adds. The aggregated benefits across the value chain are huge. Thats why were working towards becoming a digital first organisation that creates cultures, structures, and processes which support digital transformation.

Practically, Pierre Swart, CEO of mining software specialist Accutrak, agrees with this whole-view approach to digital transformation.

He does, however, believe that optimising data is crucial to any digital transformation initiative.

Everything, for me, boils down to the optimisation of data at the end of the day, he says. If we have accurate data, we can analyse it to identify patterns, or when patterns break. We can create business improvement tools and start to use predictive algorithms that can tell us that something will likely happen before it does.

That kind of data optimisation cannot, however, occur without the necessary levels of connectivity.

As Gys Malan, Solutions Manager, Huawei, points out:

What one absolutely cannot miss when it comes to thinking about a digitally-transformed mine is connectivity.

Unfortunately, he adds, this is something that sometimes get neglected when mines try to embrace digital transformation.

Here, Malan says, its important to understand that a typical mine may need a combination of several different technologies to meet its connectivity needs.

Its important that you have different options for transporting the data from sensors embedded in different parts of the mine to upper layer platforms, he says.

He also points out that its important to be able to integrate the data from different platforms to create a central data lake, which allows for easier central decision making.

At Huawei we assist our mining clients to achieve these objectives with a variety of products and services, he says. When it comes to connectivity, for instance, our 5G and private LTE offerings allow for large amounts of data to be transmitted at very low latencies.

While these forms of connectivity are important, Malan still believes that Wi-Fi and Fibre have important roles to play in mines across the globe. Whether its connectivity or any other aspect of digital transformation, he cautions against anyone pegging their bets on any single technology.

We have to diversify the communication technologies that we use based on environmental factors and application requirements, he says.

If mining is to continue playing an important role in South Africa, then it must digitally transform. As the webinar speakers demonstrated, however, thats not just about adopting new technologies but being selective and using them in the way that best suits a particular mines needs and aspirations.

Read the original:

Digital transformation is crucial to the future of mining in South Africa - African Mining Market

Read More..

Cyber threats on the rise in these industries in South Africa – BusinessTech

Increasingly, companies are looking to adopt smart technologies to optimise production and decision-making in order to create businesses of the future. However, as reliance on autonomous and digital technology grows, so too does the risk of cyber-attacks, says professional services firm PwC.

As technologies become more interconnected, the potential cybersecurity threats and attack vectors are growing. The consequences of these threats can be severe, resulting in production and revenue losses, regulatory fines, reputational damage, as well as the shutdown of critical infrastructures.

This has been further compounded by the complexities and uptake of smart systems that use advanced technologies such as machine learning and the Internet of Things (IoT).

Termed Smart Manufacturing/Smart Mining, South African industry leaders recognise that the terms encompass everything from Artificial Intelligence (AI) to robotics and cyber-security.

PwC said it has issued a point of view on emerging cyber threats in the mining and manufacturing industries. The document focuses on emerging cyber threats affecting these sectors, with a focus on South African and other Africa-based organisations.

Although there are considerable benefits in the convergence of these advanced technological systems and the operational technology that makes up the backbone of the sectors, it is important to note that the reliance on such connected and internet-dependent systems is not without its own risks, PwC pointed out.

Junaid Amra, PwC Forensics Technology Solutions Leader said: Organisations in the manufacturing and mining sectors face a myriad of different cyber threats. A number of organisations have not been paying enough attention to these threats. They are also not prioritising the implementation of the appropriate mitigation strategies, whilst threat actors are starting to take an interest in organisations operating in this space.

Due to the increasing level of technology adoption, the consequences of attacks on organisations in these sectors can be far-reaching and potentially devastating. It is therefore important for businesses to understand key risk areas, attack vectors and vulnerabilities to ensure that they employ the correct controls to improve security and protect their assets.

The technologies most targeted by attackers within these sectors are Industrial Control Systems (ICS). ICS are embedded computing devices that are responsible for a myriad of automated process controls in industries (e.g., measuring instruments, packaging machinery and all other components of an assembly line that make parts of any production process.

The Covid-19 pandemic has further exacerbated the problem of cyber-attacks. According to international research, there was an uptake in intrusion activity in the manufacturing sector in 2020, as well as several cybersecurity incidents in some countrys mining and resources sectors, said Amra.

PwCs paper highlights the different threats to ICS technologies and the profiles of the actors perpetrating these attacks. It also focuses on notable incidents to help demonstrate the complexity and subsequent impact of ICS attacks.

Attacker tactics, techniques and procedures

PwCs global Threat Intelligence practice recognises four types of motivations driving attackers, namely espionage, hacktivism, terrorism/sabotage and organised crime. There are also a range of different tactics, techniques and procedures used by each attacker.

This not only determines the impact of each attack but also the means by which organisations get targeted and subsequently compromised. It is also notable that insiders can be part of any threat group, PwC said.

Organisations who are mindful that a security breach can take several different forms and originate from several different places are in a better position to imagine ways of implementing the correct defences.

It is important to note that local regulator stipulations and disclosure laws play a major role in the number of incidents that are reported and, as a by-product, known to the public.

Motivation

Espionage has been growing as one of the driving forces behind cyber-attacks in the manufacturing industry. Cyber-criminals gain access to the networks of businesses in the sectors with the aim of stealing trade secrets and intellectual property.

However, our research revealed that although in 2020 there was a notable uptick of espionage-motivated incidents as compared to the same period last year, most of the attacks have predominantly been financially motivated (63-95%).

We have also drawn on our experience conducting cyber-security assessments and penetration tests from across our global network to identify the most common security vulnerabilities in OT/ICS networks.

The most common attacks identified by PwCs incident response teams over 2019 and 2020 were: infiltration of insecure email platforms following cloud adoption; phishing; and insecure remote access platforms (VPN, remote login), PwC said.

Ransomware

Once attackers have a foothold in an organisation, the tools and tactics used by them are usually designed to monetise their attacks by the simplest means possible. An example is ransomware, which is a type of malicious software (malware) that holds your systems or data to ransom.

Globally, PwC has tracked ransomware attacks across various industries for 2020. Of these, 17% affected the manufacturing sector but no data appears to have been advertised from the mining sector.

Based on our experience, the nature of attacks in the mining sector have largely been focused on electronic payment fraud, industrial espionage and sabotage. Data available for the African continent is limited, however, we believe this to be a representation of how susceptible African organisations in the sectors are to these types of attacks, PwC said.

Potential impact

Cyber-attacks are becoming more pronounced as technology is embedded in operational processes. Apart from the loss of data and intellectual property, the risk to the core business operations becomes heightened and could lead to severe disruption through cyber-attacks.

In addition, safety, health, environmental and quality (SHEQ) systems could also be affected as there is a growing dependence on smart devices to support these processes and functions.

Organisations in the mining and manufacturing sectors need to embed a safety culture against potential cyber-attacks organisations should have plans and processes in place to prevent, respond and recover from a potential cyber-attack. The likelihood and consequences of a cyber-attack should not be downplayed, said Amra.

Read: What 2021 holds for cybersecurity in South Africa

Read more from the original source:

Cyber threats on the rise in these industries in South Africa - BusinessTech

Read More..

Using ITeS to transform businesses and create resilience in a post-Covid world – Livemint

In a post-Covid world, digital transformation is no longer just a competitive edge which is good to have". It is now considered critical for business resilience around the world, especially as Cloud computing enables a variety of industries to dream of things that never existed.

Evidence shows that businesses that have already started their business transformation journeys feel better equipped to respond to swift changes while more digitally prepared organisations now have an advantage in navigating the upheavals and challenges presented by the pandemic.

The latest session of Trending Now: ITes- Technology makes the future resilient, in partnership with Microsoft, saw industry experts come together to discuss how ITeS tools can effectively be deployed to make your business resilient in a post pandemic world.

In the Indian context, the IT industry which was estimated to degrow has actually grown to up to 194 billion dollar revenues up to March 2021. This is an addition of about 4 billion dollar revenues. New workforce models have emerged about 1.38 lakh new jobs have been created in India over the past year in digital sales and concepts of gig economy and enterprise talent cloud have emerged," said Dhanniya Venkatasalapathy, Senior Director and National Head - Information Technology Vertical, Microsoft India.

There is a lot of focus towards digital digital talent acquisition, upskilling the workforce, M&As through digital acquisitions and towards improving overall customer experience. All that can be achieved only by moving away from the legacy model and spending on digital," Venkatasalapathy further said.

The past year has been about thinking out of the box and using ITeS to transform business practices. Some of the changes of 2020 are here to stay and are going to transform the way the IT industry will work in the future.

First, there was Y2K. After that, this is the next big event that is going to move us ahead and throw some new ways of working into our enterprise. Earlier, digital was a WOW factor. But the past one and a half years has seen a conversation shift that is mindboggling. The key factors that encapsulate the change are agility in the industry, catalysts for digitalization and the shift to Cloud, Artificial Intelligence (AI)/ Machine Learning (ML), and the workforce of the future," said Tushar Phadnis, Senior Director at Global Delivery Partner, Cognizant Technologies Solutions India Private Limited.

The ITeS industry needs to see what kind of a workforce they need to invest into today, that will be relevant a few years later. The existing workforce needs to be transformed and roles across all functions will need to adapt to AI/ML, Cloud and automation.

The clich till even two years ago was that AI will come and take jobs away from humans. But, it is actually turning out to be a force multiplier. I believe that the roles are going to change and how humans interact with digital will transform," Phadnis added.

Business transformation is synonymous with digital solutions today. Even with advanced tools, solutions tend to focus on data aggregation without offering any kind of true insights. The need of the hour is to tailor the solutions to cater to the changing needs of todays work order.

We are helping our clients pivot from looking at historical data and moving it to more predictive modelling, statistical regressive techniques that take the historical data into context and build the information for the future," said Mudit Kumar, VP-Consulting & Global Delivery, Global EProcure.

Mixing of data mining in day to day business operations is a practice which is fast gaining popularity across industries to improve growth trajectories and gain competitive business advantage.

The efforts for digitalization have been on for a long time. What the pandemic did was accelerate the process by 5-10 years. And, the reason why this happened is because one of the key bottlenecks that is user adoption was no longer a challenge. With the power of data, every customer can be treated as a micro segment and we can build services, recommendations around the entire journey to improve revenue realisation and customer lifetime value," said Birender Sen, Business Leader-Business Process Services, Tech Mahindra.

The key challenges that the IT industry is facing today is that synching the customers requirements with a hybrid work strategy, competing with global players for a share of the digital wallet and the fact that companies want to charge more for digitalization as they are hiring more specialists and upskilling existing talent. Now more than ever, it is imperative that stakeholders have an unified view of the operational and commercial side of a business.

Certain digital tools will be indispensable for this transformation. The key tools that our customers are investing in include anything towards building a secure hybrid workplace. The second one is about improving the employee experience and their productivity by enabling them with tools which are low code. Then, building the entire internal efficiency and how Cloud is playing an integral role in DevOps. Last, is data analytics to help companies make quick and informed decisions and improve operational efficiency as well as productivity," said Venkatasalapathy.

With democratization of data come challenges of security. As operations continue remotely, there has been an alarming increase in cyber-attacks across the world and India is no exception.

One of the most important challenges that I have faced was always security, from the point of view of the customer, IT company as well as employee or end user who started working from home since March 2020. While a lot of anti-intrusion tools and technologies have been put in place, the end user appreciation of it has changed in a remote working scenario," said Phadnis.

Over the last 25 years, there has been a brutal focus on efficiency and cost saving. The result was that there was just no redundancy in the system. After the pandemic hit, the top priorities became resilience and continuity vs efficiency and savings. This seems to be the way forward.

There are three building blocks towards this supply chain visibility, looking at end to end value chain using digital tools that allow for collaboration, advanced of advanced digital tools to pull in real-time information from the market," said Kumar.

Subscribe to Mint Newsletters

* Enter a valid email

* Thank you for subscribing to our newsletter.

Never miss a story! Stay connected and informed with Mint. Download our App Now!!

Read the rest here:

Using ITeS to transform businesses and create resilience in a post-Covid world - Livemint

Read More..

Do the costs of the cloud outweigh the benefits? – The Economist

Jul 3rd 2021

FOR THE past decade few aspects of modern life have made geeks drool more than the cloud, the cumulus of data centres dominated by three American tech giants, Amazon, Microsoft and Google, as well as Alibaba in China. In America some liken their position of impregnability to that of Detroits three big carmakers, Ford, General Motors and Chrysler, a century ago. During the covid-19 pandemic they have helped transform peoples lives, supporting online medical appointments, Zoom meetings and Netflix binges. They attract the brightest engineering talent. Amazon Web Services (AWS), the biggest, is now part of business folklore. So it is bordering on heresy to argue, as executives at Andreessen Horowitz, a venture-capital firm, have done recently, that the cloud threatens to become a weight around the necks of big companies.

Your browser does not support the

Enjoy more audio and podcasts on iOS or Android.

That possibly explains the defensiveness of Andreessen Horowitzs Martin Casado, co-author of the blog post titled The cost of cloud: a trillion-dollar paradox. On June 24th he described it in a gathering on Clubhouse, a social-media app, as one of the more misread, misquoted things Ive ever done. At the risk of further mischaracterisation, Schumpeter would summarise it as follows. It uses paltry evidence and baffling numbers (where, for instance, does the trillion dollars come from?) to propose an excessively all-or-nothing business conundrum: Youre crazy if you dont start in the cloud; youre crazy if you stay on it. Yet for all its flaws, it is well-timed. It poses a question that businesses will have to think about for years to come. If they entrust all their datathe lifeblood of the digital economyto an oligopoly of cloud providers, what control do they have over their costs?

It is a problem many companies are already grappling with. On June 29th the Information, an online tech publication, reported that Apple, maker of the iPhone, is poised to spend $300m on Google Cloud this year, a 50% increase from 2020. It is also using AWS and its own data centres to handle overflowing demand for services such as iCloud, a data-storage app. On the same day the chief operating officer of a big software firm told your columnist that the current trajectory of cloud costs is unsustainable but that it does not make sense just to leave the cloud. It is very hard. One cant be so simplistic as to say its all cloud for ever or its no cloud. Jonathan Chaplin of New Street Research likens acquiring flexible data storage on the cloud to flexible office space such as WeWork. Both are similarly expensive, he says. He knowshis boutique firm of analysts is considering renting both.

One reason Andreessen Horowitz has stirred up a storm is because it went a step further. The blog post raises the prospect of repatriation, arguing that companies could save considerable sums of money by bringing back their data from the cloud to their own servers. It uses the example of Dropbox, a file-sharing firm that in 2017 said it had saved $75m in the two years before its initial public offering chiefly by clawing back workloads from the cloud. Mr Casado and his colleague, Sarah Wang, estimate that a group of 50 such publicly traded software firms could halve their cloud bills by doing the same, collectively saving $4bn a year. That could, using generous price-earnings multiples, improve their market value by around $100bn. You dont have to be a super-sleuth to suspect an ulterior motive: if Silicon Valley unicorns take the hint, higher valuations could make venture capitalists like Andreessen Horowitz more money when they go public.

This is an oversimplification, however, in several ways. First, the cloud is not just a cost. It can also boost revenues by providing young companies with the flexibility to scale up rapidly, accelerate new product launches and expand internationally without having to build their own mishmash of racks, servers, wires and plugs. Moreover, cloud providers offer more than storage and spare capacity. Increasingly their most valuable services are data analytics, prediction and machine learning, made possible by the vast troves of data they can crunch. They may also be more difficult to hack. The question is whether a company gets a better return on its investment by paying for cloud services, or by paying to bring data centres, engineers and cyber-security in house.

Second, the supply of engineers is finite. Whereas in the past coders were trained to work with on-premise servers, the latest generation knows more about working with cloud providers. That makes repatriation harder. In a recent podcast about its decision in 2015 to shift entirely from its own servers to Google Cloud, Spotify, a music-streaming app, highlighted the opportunity costs of having engineers tied up managing its own data centres rather than working on new products. (As a geeky relic, it keeps pieces of its last big server in an urn.)

Third, profits are in the eye of the beholder. A company may hope to improve margins by reducing the cost of renting cloud servers. But building its own data centres requires investment. Labour costs will also rise to pay for engineers to manage them.

There is little to suggest that the stampede into the cloud is slowing. Gartner, a data-gatherer, predicts that worldwide spending on cloud services will increase by almost a quarter this year, to more than $330bn. Repatriation is an urban myth, says Sid Nag, Gartners research vice-president. We just dont see it.

Continuing to write blank cheques to cloud providers is not sustainable, either. The more firms embrace cloud-computing, the more carefully they must manage its costs. The biggest users, such as Apple, bargain for huge discounts. Smaller ones lack the clout. To keep costs down, they may need to run basic storage in house, diversify into the multicloud by spreading computing across several clouds, and make engineers responsible for cloud expenditures. With luck, a low-cost alternative to the biggest clouds will emerge, much as Japanese car companies challenged Detroits big three. That took half a century, though.

This article appeared in the Business section of the print edition under the headline "Raining on the parade"

Read the rest here:
Do the costs of the cloud outweigh the benefits? - The Economist

Read More..