Page 960«..1020..959960961962..970980..»

Bankrupt Celsius Network Reveals Plan To Shut Down App, Heres Why | Bitcoinist.com – Bitcoinist

When Celsius launched back in 2017, many saw the company as one that had the potential to disrupt the industry with its crypto lending platform. Six years on, Celsius chapter in the crypto world seems to be ending, as recent developments will suggest.

The Celsius app will shut down within 90 days, according to the companys revised disclosure statement in its ongoing bankruptcy proceedings. This comes as the company prepares for a new chapter that will see the company operate under a new entity, NewCo, which will be managed by Fahrenheit Group and owned by Celsius creditors.

As revealed in the statement, Celsius chose 90 days based on past experiences in enabling crypto withdrawals from the app for custody and withhold account holders pursuant to the Custody and Withhold Settlements. So users wont be able to log in to the app or access their Celsius account upon the expiry of this 90-day withdrawal window.

However, there is good news for the companys creditors as the company outlined plans for repayment. These creditors arent restricted to persons or entities that may have opened an account with Celsius. According to the company, it also plans to repay those who earned rewards on their digital assets in accounts set up with other exchanges or from companies which were part of Celsius partner programs.

As part of the repayment plan, Celsius will promptly distribute at least $2.03 billion of cryptocurrency to their [its] creditors, subject to the fluctuations in cryptocurrency prices. It will work with third-party distribution agents to ensure this plan is carried out smoothly.

To enable this distribution, the payments platform Paypal has been identified as a potential distribution agent to handle distributions to individual creditors in the US.

The company is also looking to hire a distribution agent to handle distributions to international creditors, corporate creditors, and Custody and Withhold creditors. However, if it fails to do so, the company will keep the Celsius app open for 90 days after the effective date so it can pay these creditors through the app.

As part of the restructuring process, Celsius will transition to a new crypto company called NewCo, managed by Fahrenheit Group and owned by customers. The company will also be regulated by the SEC to ensure transparency.

Fahrenheit plans to list the new companys stock on NASDAQ to maximize profits for the owners and allow the company to tap into the capital market in the future.

The companys operations will primarily focus on mining and staking, and it will enlist the help of US Data Mining Group, Inc. to handle its mining operations. On the other hand, Proof Group Capital Management will manage NewCos staking operations.

Featured image from Cryptopolitan, chart from Tradingview.com

Visit link:

Bankrupt Celsius Network Reveals Plan To Shut Down App, Heres Why | Bitcoinist.com - Bitcoinist

Read More..

Shares of big-data company Alteryx hammered on soft guidance – SiliconANGLE News

Shares of the big-data software company Alteryx Inc. went into a tailspin in extended trading today after the company issued a grim forecast for the current quarter that came in well below estimates.

Adding to its woeful third-quarter guidance, the company also said it will miss full-year forecasts. Investors reacted badly, and the stock fell more than 22%.

The company had just delivered decent results for the second quarter. It reported a loss before certain costs such as stock compensation of 37 cents per share, well above Wall Streets estimate of a 67-cent-per-share loss. Revenue climbed 4% from a year earlier, to $188 million, ahead of the analysts call for $182.1 million.Nonetheless, Alteryx posted a net loss of $120 million overall, rising from a loss of $107 million one year earlier.

For the third quarter, Alteryx said it expects revenue of between $208 million and $212 million, down 2% to 4% from the year prior and well below Wall Streets consensus estimate of $233 million. The full-year forecast doesnt look any better either, with Alteryx targeting a range of $930 million to $940 million, far below Wall Streets forecast of $984 million in annual sales.

Alteryx is a provider of tools for performing extract, transform and load, otherwise known as ETL. Its software is used by enterprises to prepare massive volumes of data for analysis. The Alteryx Cloud platform provides functionality around data cleansing, data mining and geospatial analytics, and offers baked-in connectivity to business intelligence tools such as Experian and Tableau.

Although Alteryxs software can be useful, its apparent that not every enterprise deems it to be essential. As a result, Alteryx has struggled to increase its sales amid the patchy economic environment that has seen many enterprises reduce their software spending budgets. Three months ago, Alteryx acknowledged this reality, and said it would undergo a workforce reduction plan that would shed about 300 jobs from its employee base of about 2,900.

Customers are demonstrating a strong commitment to Alteryx as they face an increasingly dynamic macro environment, as evidenced by robust and consistent gross retention and renewal rates in Q2, said Chief Executive Mark Anderson (pictured).

Analyst Holger Mueller of Constellation Research Inc. said Alteryxs problem is it cannot find the growth it needs to justify its operating costs. Growth was lackluster but the costs increased, and the result is not pretty to see, Mueller explained. So the question is where does Alteryx go next? Either the management finds a way to ignite growth, or the cost base has to be adjusted. The next quarter will tell us more.

Although its struggling to improve sales, the company has continued to innovate. During the quarter, it unveiled a new artificial intelligence engine for the Alteryx Analytics Cloud Platform, aiming to improve productivity for users.

Alteryx AiDIN was announced at its annual user conference Inspire 2023, bringing a number of generative AI capabilities to Alteryxs flagship platform, including an automatic insights feature called Magic Document and a Workflow Summary tool for data preparation tasks.

As we look to the second half of 2023, we are reinforcing our commitment to improving profitability, while also sustaining a high pace of platform innovation with Alteryx AiDIN, our generative AI and machine learning technologies, as well as cloud-connected technologies, Anderson said.

TheCUBEis an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate thecontent you create as well Andy Jassy

THANK YOU

Excerpt from:

Shares of big-data company Alteryx hammered on soft guidance - SiliconANGLE News

Read More..

The Role of Predictive Analytics in Modern Astronomy – Fagen wasanni

The field of astronomy has experienced a significant shift in recent years, moving from traditional observation techniques to the utilization of predictive analytics and data mining. With the advancement of technology, astronomers now have access to an unprecedented amount of data from telescopes and space-based observatories, presenting both opportunities and challenges.

The abundance of high-resolution images and spectra of celestial objects has allowed researchers to delve deeper into the mysteries of the cosmos. However, analyzing and interpreting this vast amount of data efficiently has become a new challenge. This is where predictive analytics and data mining come into play.

By implementing advanced algorithms and machine learning techniques, astronomers can sift through large datasets to uncover patterns and trends that were previously unattainable using traditional methods. This data-driven approach has revolutionized astronomical research, with discoveries based on data analysis becoming increasingly prevalent.

The Sloan Digital Sky Survey (SDSS) serves as a prime example of this transition. Since 2000, the SDSS has been mapping the universe and collecting a wealth of data, including images and spectra of millions of celestial objects. By applying predictive analytics, researchers have made groundbreaking discoveries, such as detecting previously unknown galaxies and identifying rare celestial phenomena.

Predictive analytics has also had a significant impact on the search for exoplanets. The Kepler Space Telescope, launched in 2009, has played a crucial role in this pursuit by monitoring changes in star brightness to identify potential exoplanets. However, manual analysis and confirmation of these discoveries became increasingly difficult due to the immense amount of data generated. Through the use of machine learning algorithms, astronomers have improved their efficiency in processing this data, confirming over 2,000 exoplanets to date.

Additionally, predictive analytics has proven invaluable in studying transient astronomical events, such as supernovae and gamma-ray bursts. These events are often unpredictable and short-lived, making real-time data collection challenging. By analyzing historical data and applying predictive models, astronomers can forecast the occurrence, location, and characteristics of these events, leading to better study and understanding.

As the ability to collect astronomical data continues to grow, the importance of predictive analytics in the field becomes even more significant. The upcoming launch of the James Webb Space Telescope and advancements in ground-based observatories will exponentially increase the volume of available data. By harnessing the power of predictive analytics and data mining, astronomers will be better equipped to unravel the mysteries of the universe, leading to new discoveries and a deeper comprehension of our place within it.

In conclusion, the evolution of predictive analytics in astronomy has revolutionized how we explore and understand the universe. From mapping the cosmic structure to discovering exoplanets and predicting transient events, data-driven research has become a fundamental aspect of modern astronomy. With the continued advancement of technology, we can expect even more groundbreaking discoveries that will expand our knowledge of the universe and our place within it.

Here is the original post:

The Role of Predictive Analytics in Modern Astronomy - Fagen wasanni

Read More..

Mason scientists to work with the U.S. Navy to avert ‘internet … – George Mason University

A team of George Mason University scientists has received a federal grant of more than $13 million to work with the Department of the Navy to study and better understand increased solar activity that could potentially cause an internet apocalypse disrupting all electronic communications on Earth, including satellite communications.

Research from the grant, which will total $13.6 million in expenditures over five years, will be done in collaboration with the Naval Research Laboratory (NRL), and will include state-of-the-art data mining, analysis, and scientific modeling, among other endeavors, led by Mason faculty, students and staff. Under the terms of the contract, Mason provides scientific support for a broad range of astronomy-related activities that are of interest to the U.S. Navy and the nation at large.

The main focus is on solar activity and the way it can impact systems on Earth, said principal investigator Peter A. Becker, a professor in the Department of Physics and Astronomy within the College of Science. This is especially important to the Navyand more broadly the Department of Defensebecause high-energy outbursts from the sun can have a strong negative impact on earthly radio and internet communications. And they can also have a detrimental effect on navigation systems and energy grids on Earth.

The focus on violent solar activity is the most significant research activity for U.S. citizens as eruptions from the suns surface can have devastating consequences 93 million miles away on Earth. This violent activity includes bursts of radiation, high-speed electrons, protons and other highly energetic particles that are launched into space and can disrupt technologies such as the internet that we have come to depend on. Much of this activity can reach Earth in less than a day.

Violent solar storms are expected to become more frequent and more severe over the next 10 years, and they possess the potential to severely interfere with radio transmitters, navigation and GPS, satellite operations and communications, and the electric power grid. Being able to more effectively warn of their occurrences will help better protect the public and our infrastructure.

The internet was simply not designed to handle this level of communication interference, and, consequently, is considered a very soft type of infrastructure, Becker said. Hence, the period from 2024 to 2028 is a time when the entire internet could conceivably be knocked out for a period of weeks to months in the event of a really extreme solar flare.

Such a scenario could create an unprecedented disaster for modern society, potentially triggering a worldwide recession, Becker warned, because of the worlds heavy dependence on the internet for information, communications and global commerce.

Becker and his team, which also includes several Mason undergraduate students, will also study black holes and neutron stars. These studies will help scientists understand similar processes occurring in the solar atmosphere and how they can affect life on Earth.

Most of the Mason teams work will be performed at the NRL in Washington, D.C., although space has also been allocated at George Mason Universitys Fairfax Campus to accommodate visiting NRL scientists working on joint space science research projects.

Others researchers working on Beckers team include associate research professors Tyrel Johnson and Iulia Deneva; senior research administrator Jessica Hanna; research scientists Jacob Smith, Carlos Braga, Natsuha Kuroda, Eliana Nossa Gonzalez and Craig Johnston; senior research scientists Megan DeCesar and Keiji Hayashi, postdoctoral research fellows Sherry Chhabra, Micah Weberg, and Shaheda Shaik.

Mason scientists are working to explore and understand the nature and level of these dangerous threats to our infrastructure posed by strong solar activity, Becker said, and how to predict extreme events and mitigate the damage.

See original here:

Mason scientists to work with the U.S. Navy to avert 'internet ... - George Mason University

Read More..

The History and Evolution of Mining Healthcare Data: A Discussion … – EnergyPortal.eu

In a recent podcast episode, Michael Ibara, Chief Data Officer at Elligo Health Research, delved into the fascinating history of mining healthcare data and its applications in identifying safety events. He also discussed the evolution of bringing electronic health record (EHR) data closer to the world of clinical research.

With over 20 years of experience in clinical research and development, Ibara has a deep understanding of the regulatory and policy implications of digital healthcare. Prior to joining Elligo Health Research, he held various positions at Pfizer, including Head of Business Development Coordination and Innovation, and Head of Pharmacovigilance Innovation.

During the podcast, Ibara compared the potential impact of artificial intelligence (AI) to the new electricity. He explained that AI has the potential to revolutionize clinical trials, regulatory processes, and raise ethical considerations surrounding large language models.

By mining healthcare data, researchers can identify safety events and make informed decisions about patient care. The advancements in EHR data integration have allowed for a closer collaboration between clinical research and healthcare providers. This integration enables researchers to access real-time patient data, which can lead to more efficient and accurate clinical trials.

Ibara also highlighted the potential applications of AI in clinical trials. AI algorithms can analyze vast amounts of data, identify patterns, and predict outcomes, allowing for personalized medicine and more targeted interventions. However, he emphasized the importance of addressing ethical concerns associated with AI, such as algorithmic bias and data privacy.

As the field of healthcare data mining continues to evolve, the possibilities for improving patient outcomes and advancing medical research are immense. With the integration of EHR data and the potential of AI, we are entering an era of data-driven healthcare that holds great promise for the future.

Read more:

The History and Evolution of Mining Healthcare Data: A Discussion ... - EnergyPortal.eu

Read More..

Eight tips for talking to your kids about bullying – RED. Relevant. Essential. Denver

Bullying can happen to anyone at any age. And the effects of bullying can extend well into adulthood, leading to depression, anxiety, health complications and decreased academic performance. Yet many adults are hesitant to intervene when children are bullied, said Shawn Worthy, Ph.D., professor of Human Services and Counseling at Metropolitan State University of Denver.

RED talked to Worthy to learn best practices for parents to keep in mind when having conversations about bullying with their children.

For K-12 kids, bullying occurs most frequently in middle school, with 28% of middle-schoolers reporting being bullied in 2019, compared with 19% of high school students. Additionally, approximately 16% of students experience cyberbullying every year, though that number is likely an underestimation, Worthy said.

Whenever you have something that is humiliating or socially inappropriate, you tend to get an underestimate of it because people dont want to say that its happening to them, Worthy said.

In schools, students can experience verbal, physical or relational bullying, as well as property destruction. Online, cyberbullying can occur over social media, text messages, direct messages, emails or while gaming. The Centers for Disease Control and Prevention (CDC) and the U.S. Department of Education define bullying as unwanted aggressive behavior that involves a power imbalance, whether real or perceived, and is likely to be repeated.

Worthy said to keep an eye out for any of the following symptoms that may occur as the result of being bullied: sadness, isolation, loss of confidence, bruises, injuries, lost or broken items, declining grades, trouble eating and sleeping, loss or change of friends and avoiding specific people or situations.

RELATED: What kids need in the classroom

Typically, bullying occurs for a couple of reasons. The first reason, Worthy said, is because the child has experienced bullying and their response is to bully others. Bullying can also happen when something else is going wrong in the childs life and he or she doesnt know how to deal with it.

A lot of times, bullying is displacement, Worthy said. Something is making them angry or frustrated, and they cant deal with it where its happening, so they take it out on other people.

If you discover your child has bullied someone, Worthy recommends taking steps to prevent bullying from happening again and talking to your child about any problems theyre having at home or with people who are close to them.

Its important to talk to your kids about bullying, but its more important just to talk to your kid, Worthy said. Creating positive habits around communication can go a long way, he added, saying young people who have a habit of honest communication with their parents are much more likely to tell them when theyre being bullied.

Parents who dont regularly communicate with their kids can start small. Worthy said spending time with your kids, even while eating dinner or driving to school and back home, can help create space for kids to feel comfortable talking to their parents about difficult subjects.

The reality is that you dont choose when important conversations happen, Worthy said. Your kid chooses when the important conversation happens, and if youre not around when they need you, it likely wont happen.

As long as its safe to do so, young people should feel empowered to step in when they see bullying happening and stand up for the person being bullied. But it depends on the circumstances, Worthy said. Kids often arent particularly good at understanding social cues and nuances, so ask for details about the situation before offering advice.

When one or two people step up and ask the bully to stop or notice it or dont laugh at it, that goes a long way in stopping the bullying, Worthy said.

Its also a good idea to let your child know they should talk to whoever is in charge when they see bullying. Hopefully, the adult will step in to correct the behavior.

Cyberbullying, though, is completely different, Worthy said. Thats because it can come from multiple places and can be anonymous, and the comments or pictures can have a lasting presence.

The better option (online) is not to engage, because a lot of times they can turn their bullying to you, Worthy said.

Cyberbullying and online safety, especially on social-media platforms, are intrinsically linked, Worthy said. Its important to have a bigger conversation with your kids about how to protect themselves when using the internet. For example, kids should know to never disclose their address, phone number or Social Security number online. They should also know how to identify unsafe links and sites that can lead to viruses or data mining.

RELATED: Should you be worried about TikTok?

Additionally, he recommends talking to your kids about parental controls that are available on social-media sites.

You dont want to secretly monitor your kids online, but you do want to have some parental controls in places where you can check in every now and then and help your young person understand what constitutes bullying and abusive behavior, Worthy said. Sometimes, they dont recognize it when they experience it.

If theres one major takeaway for parents to know about bullying, its to take it seriously, Worthy said. Bullying can impact a childs life for an extended period, and parents should always show concern when their child is involved in a bullying incident.

Its not uncommon for people not to want to get involved, Worthy said. But kids will be kids is not an OK response.

If your child does approach you about bullying, Worthy said there are three things to remember when entering the conversation: Dont shame them. Dont blame them. Believe them.

Visit online resources such as stopbullying.gov and the CDCs violence-prevention page for facts and general advice about bullying. If youre worried that your child is being actively bullied, talk to the school or the school district, which should have resources such as counselors or social workers available. Outside counseling is an option if additional support is needed.

Continue reading here:

Eight tips for talking to your kids about bullying - RED. Relevant. Essential. Denver

Read More..

Top 10 Cyber Threat Intelligence Tools to Keep Your Data Safe – Analytics Insight

Cyber threat intelligence tools continuously monitor various data sources, including dark web forums, hacker chatter, and malicious websites, to provide real-time updates on emerging threats. They provide information about the origin, tactics, techniques, and procedures of cyber adversaries. This proactive approach allows organizations to stay ahead of potential attacks and take preventive measures.

Cyber threat intelligence platforms play a crucial role in maintaining robust cybersecurity hygiene round the clock. The top 10 cyber threat intelligence tools showcased in this article have been crafted to provide the most up-to-date and actionable insights and contextual information about the nature of threats, their potential impact, and recommended actions.

In this article, we highlight the threat intelligence tools that have proven to be highly effective in safeguarding businesses from cyberattacks in 2023. Before we delve into the world of advanced cybersecurity solutions that are here to protect and empower organizations in the development of targeted defense strategies, lets first get the basics right.

Choosing the best cyber threat intelligence tool is paramount for any company. It must align seamlessly with the unique requirements and work ecosystem of the organization. Here are five essential features to consider when adopting the best cyber threat intelligence software in 2023 to aid you in this selection process.

Data Aggregation: The ability to collect and aggregate data from various sources, including open-source intelligence (OSINT), dark web, social media, and proprietary feeds.

Real-time Monitoring: Continuous monitoring of threats in real-time to identify emerging risks and potential cyberattacks promptly.

Threat Analysis: Advanced analytics and machine learning capabilities to analyze and categorize threats and providing actionable insights.

Integration Capabilities: Seamless integration with other security tools and platforms to enhance overall cybersecurity operations.

Incident Response Automation: Automation of routine tasks and processes to expedite incident response and reduce manual effort.

Threat Indicator Sharing: The ability to share threat intelligence with trusted partners or relevant industry peers for collective defense.

Reporting and Collaboration: Comprehensive and customizable reporting capabilities to facilitate collaboration among different teams and stakeholders.

IoC Management: Management of Indicators of Compromise (IoCs) to identify malicious activities and prevent further spread across the network.

Cyber Threat Intelligence tools have become indispensable for companies aiming to fortify their security measures effectively. These tools are vital in gathering and analyzing threat data from external sources, ensuring businesses can shield themselves from existing vulnerabilities and stay prepared for potential future threats.

The global cyber threat intelligence market was valued at $392.2 million in 2020 and is expected to reach $981.8 million by 2023, as per Statista. Several leading companies in this segment can equip you with powerful tools to take on sophisticated threat variants.

Cyble Vision is Cybles advanced AI-powered Threat Intelligence platform, providing organizations unparalleled visibility into the dark web and underground cybercrime platforms. Recently the company has secured $24 million in Series B funding, to propel its AI and Threat Intelligence offerings.

Recognized as the Best Threat Intelligence Platform of 2023 by the Cybersecurity Excellence Awards, Cyble Vision offers a unified view of potential risks, ensuring that businesses stay one step ahead of cyber threats. Through proactive monitoring, real-time alerts, and in-depth threat analysis, Cyble Vision leverages over 5 billion Darkweb records per month, monitors more than 15 billion pages per day, and keeps tabs on over 5,000 Threat Actors 24/7. The platform encompasses more than 6 capabilities, including Threat Intelligence, Attack Surface Management, Brand Reputation Monitoring, Dark Web and Deep Web Monitoring, Threat Hunting, Vulnerability Management, and Third-Party Risk Scoring. Additionally, it offers 40+ subsequent use cases that are essential for every organization.

You can schedule a demo of this platform to see how it fits your business needs.

Cisco, a global cybersecurity and network solutions leader, presents its paramount cyber threat intelligence software, Cisco Umbrella. Empowered by advanced threat intelligence, Cisco Umbrella robustly safeguards endpoints, remote users, and office locales. This software accommodates diverse security needs, encompassing web security, cloud access, and data loss prevention. Its strength is collecting comprehensive cross-product security data from Cisco infrastructure and third-party sources, facilitating proactive cybersecurity strategies.

ThreatStream by Anomali is harnesses millions of threat indicators to proactively identify new attacks, detect existing breaches, and enable security teams to respond swiftly to potential threats. With its extensive data aggregation capabilities and seamless integration with various security tools, Anomali ThreatStream equips organizations with the insights needed to stay one step ahead of cyber adversaries.

IBM X-Force Exchange is a top threat intelligence tool designed to empower security analysts with focused insights into critical threats. This Threat Intelligence Platform (TIP) offers a unique perspective on potential cyber threats by combining a vast global security feed with human-generated intelligence. It continuously monitors and gathers threat intelligence from over 25 billion websites and millions of endpoints across the globe, ensuring organizations are well-equipped to tackle emerging risks.

Rapid7, a leading cybersecurity and network solution provider, has made a significant move by acquiring IntSights, a company renowned for blending threat intelligence, data, and cutting-edge tools. This strategic collaboration aims to empower cybersecurity professionals with swift and effective measures to halt attacks and enhance return on investment (ROI). Rapid7 has seamlessly integrated IntSights advanced technology into its powerful threat command platform, further solidifying its position in the industry.

LookingGlass is a premier data intelligence platform, harnessing information from over 80 available and exclusive commercial feeds. This vast wealth of data is meticulously organized into a repository called Collections, empowering businesses to quickly access and utilize critical information. A distinctive feature of LookingGlass is its cutting-edge Threat Indicator Confidence scoring tool, which enables organizations to identify and address top-priority risks swiftly.

ThreatConnect is one of the best threat intelligence software that offers a unified and comprehensive platform. With integrated cyber risk quantification, intelligence, automation, and analytics, ThreatConnect empowers your organization to strengthen its defenses against potential risks and threats. It simplifies complex data into actionable insights, ensuring your team can make informed decisions to protect your assets.

RecordedFuture offers an advanced, cutting-edge tool that automates the entire process, from data collection to analysis and reporting, delivering profound insights into your adversaries, infrastructure, and potential targets.

ThreatQ, the best cyber threat intelligence tool from ThreatQuotient, offers a flexible and collaborative environment for effective cyber threat management and analysis. It addresses evolving cybersecurity challenges with a dynamic platform for proactive defense. ThreatQ aggregates data from diverse sources, centralizing the threat landscape view. Custom playbooks and workflows automate tasks, enhancing security operations.

ThreatMiner, a top cyber threat intelligence tool, specializes in collecting, analyzing, and visualizing threat intelligence from diverse sources. This tool streamlines the process of identifying and comprehending cyber threats for organizations. It employs advanced data mining techniques to extract and process threat intelligence data, spanning malware repositories and open-source feeds.

See more here:

Top 10 Cyber Threat Intelligence Tools to Keep Your Data Safe - Analytics Insight

Read More..

Power of data being used to help boost farmers – De Montfort University

A new project aims to harness the power of data to help farmers to make more money from their produce and save crops from going to waste.

De Montfort University Leicester (DMU) has teamed up with Nigerian data company Microscale Embedded and University of Ilorin in Nigeria to develop and launch a new online platform that will connect producers to buyers, markets and processors across Nigeria.

A cassava harvest being processed

Research shows that the agricultural value chain the process which connects farmers to buyers is fragmented and unclear with many growers unaware of the nearest processing facilities, or unable to get goods to market quickly enough because they do not know of storage or transport solutions.

The digital platform AVAC (Agricultural Value Chain) will allow farmers to get location-based information on processors, transporters, markets and distribution. The Knowledge Transfer Project (KTP) has been funded by Innovate UK through a grant of more than 140,000. KTPs connect forward thinking businesses with university expertise to solve a specific, strategic innovation challenge faced by a business.

Darsh Chauhan, Knowledge Exchange officer at DMU, said: AVAC will have positive impacts on food security and the welfare of the poor. Impoverished areas with smallholder farming communities will experience improved welfare through improved economic activities.

Long term sustainability and growth of small farmers will lead to increased export capacity and national GDP growth.

Dr Sulemain Yerima, senior lecturer in Cyber Security at DMU, will be bringing his expertise in data mining and cyber security to help Microscale to develop the tools and techniques it needs to run the AVAC platform. He will work alongside Professor Joshua Olaoye in Nigeria, an expert in agricultural engineering who can help model and simulate crop value chain data, and Dr Shola Sunmonu, head of the Food Engineering Department at the University of Ilorin.

Small farmers remain stuck in traditional value chains driven by subsistence markets and lack of access to formal value chains driven by growth in exports and manufacturing.

Studies have shown that 50 per cent of annual proceeds from crop production are lost post-harvest, due to inadequate access to information between farmers and buyers. Many famers do not know different markets where they can sell, and do not have the means of getting info on locations and prices of different available crops.

The project, which runs over 15 months, will provide access for farmers to this data and will allow them to enable farmers to sell direct to new buyers. They will also get information on the nearest processing and storage facilities.

Posted on Wednesday 9th August 2023

More:

Power of data being used to help boost farmers - De Montfort University

Read More..

Kenya: Kindiki, Owalo Given a Week to Provide Answers On World … – AllAfrica – Top Africa News

Nairobi Interior Cabinet Secretary Kithure Kindiki and his ICT counterpart Eliud Owalo have been given one week to provide substantive answers on the world coin cryptocurrency data mining scandal.

National Assembly speaker Wetangula granted the two CSs seven days to shed light on how the company was registered, whether the data collected amounted to a breach of security and what measures have been put in place to guarantee the safety of data mined by the firm.

Wetangula also directed the office of the data protection commissioner to be excepted from the multi-agency probe alluding that it could be compromised.

Yesterday, the two CSs appeared before the floor of the National Assembly to answer to lawmakers concerns over the illegal data mining activities by the foreign firm amidst claims of security gap that allowed for the company to operate in the country.

"I will give you another week and so you can come back with more detailed and satisfactory answers. please when responding you should give details of who licensed these people to operate in the country and more so from KICC which is a public facility," said Wetangula.

Lawmakers gave the two cabinet secretaries a hard time to explain whether the country was safe why the government took time to respond to the issue.

Kindiki revealed that investigation conducted thus far have established that crimes were committed during Worldcoin operations assuring that measures will be taken to change those responsible.

"Crimes were committed; Crimes against the data protection act, crimes against the privacy of Kenyans and the crimes against the penal code have been committed and we will get all those involved so they can face justice," stated Kindiki.

The Interior Boss pointed out that the government will fast track investigation and it will move further to request other countries for the surrender of those outside Kenyan territory for them to record statements.

"The processors of data must obtain consent from Kenyans in line with our Data proction Act. If any consent was sought, which was doubtful, it was not acknowledged consent from Kenyans," said Kindiki.

This coming days after the Ministry of Interior issued a freeze order on the movement into and out of the country for all those involved in the scandal.

"By the time government is coming in, we must have reasonable information that crimes have been committed. This issue is a serious threat just like terrorism, banditry and the sale of drugs and also just like those who want to intimidate us to use politics to commit crimes," Kindiki said.

Get the latest in African news delivered straight to your inbox

Almost finished...

We need to confirm your email address.

To complete the process, please follow the instructions in the email we just sent you.

There was a problem processing your submission. Please try again later.

"Kenya is safe. But I urge Kenyans that even as we go forward in the technological world we must be alert to the fact that the risks in the physical space are the same in the digital space," he added.

CS Owalo assured that the multi-agency team investigating the matter will be keen to establish whether the Worldcoin mining data project was an attack on the nation.

"Globally, data is the new oil and we cannot block our eyes from the interest in our data by foreign entities. We will be able to ascertain the viability of the fears of those saying that what happened was as a result of foreigners having an interest in our data," said Owalo.

The ICT Cabinet Secretary also expressed that the operationalization of the project by the foreign firm through monetary inducement for data raised eyebrows on the authenticity of the data collection.

"At no point has there been a disparity in the position I took and the action by the Interior CS. I explained that at the point of registration they had met the bare minimum requirements as a data collection firm but.in the course of operationalization, certain issues on policy, laws and regulations emerged and in the course of the day government took action on them," observed the ICT CS.

The issue on the transparency of the operations of Worldcoin had been raised in in France, India, Germany, UK and other countries.

More here:

Kenya: Kindiki, Owalo Given a Week to Provide Answers On World ... - AllAfrica - Top Africa News

Read More..

Legislative changes, housing pressure force updates to city code – Missoula Current

Martin Kidston

(Missoula Current) Legislative changes and pressure to address certain issues sooner than later has prompted the city's planning department to prepare several updates to its zoning and codes.

Dubbed Our Missoula, the code-reform effort is intended to bring the city's wide array of regulations into a single document and streamline housing and development. The process is likely to take several years, though a number of changes will be made sooner.

Many of the changes outlined in the process are legally mandated because of changes made during the legislative session, said Eran Pehan, director of the city's planning department. The city is very well prepared to implement these mandates. It's also an opportunity for the community to help define how the city will meet state mandates while identifying additional changes that can be made now to support the ultimate creation of housing.

The city kicked off its long-anticipated code reform effort last year. The work will result in a range of policy changes, from subdivision review to land use. It will also align city zoning with the growth policy, something that's been an issue for years.

Changes mandated by the Legislature will also come into play. Among other things, they include subdivision review, changes to condo projects, allowing accessory dwelling units, parking reductions, an increase in the number of children at daycare, and allowing cryptocurrency.

They're also going to be restricting use of design standards and the design review process, said city planner Laval Means. The legislative changes are legally mandated by the state, and we must comply with them.

The city plans to divide its recommendations into two phases. The first phase will address legislative bills that go into effect this year. The second phase would incorporate bills effective next year.

This phased approach enables us to get the most pressing state mandates integrated into our local rules as soon as possible, Means said. Some code amendments shouldn't wait until the end of the process, but should be brought forward as early deliverables. That would address urgent community needs and address state policy changes.

Like many cities across the region, Missoula has fallen short on its housing inventory, which no longer meets current demand. The result has driven home prices and rent to record highs.

To address the issue, Gov. Greg Gianforte last year convened a housing task force to explore solutions. While Missoula had already launched its code and zoning reforms, recommendations passed by the Legislature will force updates sooner than the city had planned.

That also allows cryptocurrency and other data mining operations. Both the city and county had regulated the industry given its enormous use of energy, but that's no longer possible.

The way state law is written right now, we don't have an option to address cryptocurrency, said Means. They are required by state law to be allowed in industrial areas, as a baseline.

Continued here:

Legislative changes, housing pressure force updates to city code - Missoula Current

Read More..