Category Archives: Data Mining
How To Swiftly Generate Passive Income With FancyCrypto Cloud … – Analytics Insight
FancyCrypto Cloud Mining includes one of the best websites that users can sign up with to get a chance to generate passive income. In this case, the only question that one can ask is if you have considered joining the cryptocurrency mining world. In reality, mining has remained a lucrative alternative for people who become reluctant due to crypto trading risks. However, with time, the mining process has become highly challenging for several reasons. Below is a section of factors that have contributed to that:
Although several issues are associated with cloud mining, one should not lose hope since it has emerged as a feasible alternative in the past few years. For instance, with cloud mining, people can rent hardware for mining from a registered cloud mining service provider and, in return, get a share of profits earned through a mining operation. Such an approach avoids requiring one to buy costly tools or worry about energy costs. Therefore, it makes cloud mining a more accessible option for most people.
Research indicates that many people never thought cloud mining could contribute to surprising news globally. When it was first introduced, most people could visualize its potential. However, currently, it has changed several aspects of the crypto-mining world. The following are reasons why cloud mining is a huge deal:
Since it is evident for one to notice the growing demand for reliable cloud mining platforms, Fancy Crypto includes one of the platforms that has gained popularity. Mining enthusiasts have made it their favorite platform since it provides secure and reliable cloud mining services.
Currently, people do not need to search online for a trustworthy cloud mining service. Luckily with a user-friendly mining platform like Fancy Crypto, people can mine cryptocurrencies with confidence and ease. In reality, this platform has emerged as a leader in the industry as it boasts more than 360,000 users globally. Fancy Crypto uses state-of-the-art technology that powers advanced industry data centers from almost anywhere and any device, making it globally accessible.
However, what differentiates Fancy Crypto from other cloud mining platforms? Below are a few reasons why you should focus your attention on this platform.
What aspects make Fancy Crypto distinct from other cloud mining services? First, they have unique cloud mining profits and packages. In reality, a package suits everyone since they have several packages that provide varying daily contract prices and profits. The best part is that this platform settles interest within 24 hours, making it one of the fastest mining services. Their packages include:
Free cloud mining: Such a contract stays valid for one day and costs $10. It has a fixed return of $10.15.
Experienced project cloud mining:It is priced at $100 and is valid within your days. Its fixed return is $105
Ethereum project cloud mining: It is priced at 300, valid for five days, and has a fixed return of $324.
Litecoin cloud mining: Such a contract is priced at $800, valid for ten days, and has a fixed return of $944.
Dogecoin cloud mining: It is priced at $1500, valid for 15 days, and has a fixed return of $1938.75.
Ethereum classic cloud mining. It is priced at $3000 and valid for 28 days, with a fixed return of $4806.
Bitcoin cloud mining: It is priced at $5000, valid for 56 days, with a fixed return of $11580.
Further, the platform provides a referral program which compensates affiliates for encouraging new users to join. The benefits of the referral program include
The platform has changed the cryptocurrency world. Understandably, it has become a good solution for users wishing for an affordable, highly profitable, and feature-rich mining experience. Also, with its referral program, one can make passive income by investing. Therefore, it provides a win-win scenario. It is time to consider beginning your journey in the profitable cloud mining industry. If you wish to uncover more information, you can look at https://fancycrypto.com/.
See the article here:
How To Swiftly Generate Passive Income With FancyCrypto Cloud ... - Analytics Insight
FTSE 100 Closes Up 0.6% as Mining, Oil Stocks Gain on Hopes of … – Morningstar
The FTSE 100 Index closed Thursday up 0.6% to 7490 points, in line with global peers, as investors focus switched away from the U.S. debt ceiling toward the broader economic outlook amid increasing signs that inflation is slowing, CMC Markets UK chief market analyst Michael Hewson says in a note. The rebound in commodities supported miners and oil-exposed stocks, with Fresnillo closing up 4.5% and leading the index top raisers. Retailer B&M shares chased yesterday's gains and rose 3.8%, reaching its 13-month highs after its FY 2023 earnings report, followed by Melrose Industries, up 3.8%. Shares of the digital automotive marketplace Auto Trader were among the worst performers, down 3.4% after its FY 2023 report.
COMPANIES NEWS:
Auto Trader FY 2023 Pretax Profit Fell on Rising Costs; Names New Chairman Designate
Auto Trader Group said Thursday that fiscal 2023 pretax profit fell slightly on operating costs, although revenue rose on strong retailer revenue, and named Greggs's Matt Davies as chairman designate to replace Ed Williams.
---
Pennon Group Swung to FY 2023 Pretax Loss on Inflationary Costs
Pennon Group said Thursday that it swung to a pretax loss in fiscal 2023 as inflation-driven power and financing costs weighed on its earnings.
---
ITM Power Sees FY 2023 Revenue Beating Guidance, Loss Meeting Expectations
ITM Power said Thursday that it now expects fiscal 2023 revenue and net cash to exceed previous guidance, and its adjusted loss to meet expectations.
---
Dr. Martens's FY 2023 Profit Slipped Despite Record Revenue; Plans Buyback
Dr. Martens said Thursday that its fiscal 2023 pretax profit slipped despite hitting record revenue, and that it plans to conduct a share buyback.
---
ME Group Lifts FY 2023 Guidance After First-Half Pretax Profit, Revenue Rose
ME Group International said Thursday that it has raised its full fiscal-year guidance on the back of strong revenue and pretax profit growth in the first half of fiscal 2023.
---
Quantum Blockchain Technologies Raises GBP1 Mln via Discounted Share Placing
Quantum Blockchain Technologies said Thursday that it has raised 1 million pounds ($1.2 million) via a discounted share placing and will use the money toward research and development, with a particular focus on its bitcoin mining machine learning algorithms and software product release.
---
Duke Royalty 4Q Recurring Revenue Rose to Record High; Sees Further 1Q Growth
Duke Royalty said Thursday that its recurring cash revenue continued to grow to record levels in the fourth quarter of fiscal 2023, and that it expects further growth in the first quarter of the new year.
---
Westminster Group 2022 Pretax Loss Narrowed as Revenue Rose
Westminster Group said Thursday that 2022 pretax loss narrowed as revenue increased, and that performance for the first quarter was ahead of its expectations.
---
Rockfire Resources Raises GBP880,000 via Subscription for Greek Zinc Project
Rockfire Resources said Thursday it raised 880,000 pounds ($1.1 million) via a discounted subscription and that it will use the proceeds to start resource upgrade drilling at its Molaoi zinc project in Greece and an updated JORC mineral resource estimate.
---
Clontarf Raises GBP350,000 in Share Placing
Clontarf Energy said Thursday that it has raised 350,000 pounds ($435,505) via a placing of shares at a price of 0.08 pence a share.
---
Network International Gets Deadline Extension for Both Takeover Offers
Network International said Thursday that the U.K. Takeover Panel has extended the deadline until June 9 for bidders Brookfield Asset Management, and CVC Advisers and Francisco Partners Management to either make a formal offer for the company or walk away.
---
Rotala Agrees to Depot Sale for GBP30.4 Mln
Rotala said Thursday that it has conditionally agreed to the sale of its depot in Bolton, England and most of the related vehicles for a cash consideration of around 30.4 million pounds ($37.8 million).
---
Team PLC to Raise Extra Funds This Year; 1H Pretax Loss Narrowed
Team PLC said Thursday that it will need to raise extra funds over the next twelve months, and posted a narrowed pretax loss for the first half of fiscal 2023.
---
Net Zero Infrastructure Plans Reverse Takeover of LINE Hydrogen; Shares Suspended
Net Zero Infrastructure said Thursday that it has signed a non-binding letter of intent to buy LINE Hydrogen (Australia) for an undisclosed consideration paid in new shares, and that its stock listing has accordingly been suspended.
---
Avacta Group Buys Coris Bioconcept for Up to GBP10.4 Mln
Avacta Group on Thursday said it has bought Coris Bioconcept for up to 10.4 million pounds ($12.9 million).
---
Chaarat Gold Signs Preliminary Investment Agreement With Xiwang International
Chaarat Gold Holdings said Thursday that it has signed a preliminary investment agreement and a strategic cooperation agreement with Xiwang International Company in respect to a potential equity investment of $250 million from Xiwang in the company.
---
Grafenia Says Adjusted Payment Not yet Received From PFI After Subsidiary Sales
Grafenia said Thursday that it hasn't yet received an adjusted installment from PFI Group due Wednesday, part of a sale of Grafenia's subsidiaries Works Manchester and Grafenia Operations to the latter.
---
Triad Group Appoints Charlotte Rigg As Deputy Chair
Triad Group on Thursday named Charlotte Rigg as its deputy executive chair.
---
More Acquisitions Shares Dive as Trading Resumed After Failed Megasteel Takeover
Shares of More Acquisitions fell as much as 31.6% on Thursday as the company returned from suspension after saying last week that Megasteel had withdrawn from a takeover deal due to alleged abusive behavior by parties claiming to be More shareholders.
---
Enteq Technologies Taps Mark Ritchie as New CFO
Enteq Technologies said Thursday that it has appointed Mark Ritchie as chief financial officer, effective June 16, succeeding David Steel.
---
Edenville Energy Shares Rise on GBP1.5 Mln Subscription; Board Reshuffle
Edenville Energy shares rose Thursday after it said it has raised almost 1.5 million pounds ($1.9 million) through direct subscriptions by two African-focused mining investment groups, and shuffled its management.
---
Silver Bullet Data Services Shares Fall on Possible Fund Raising Need
Shares of Silver Bullet Data Services Group fell 24% on Thursday after the company said that it might need to raise extra funds in the short term, despite reporting a narrowed pretax loss for last year on higher revenue.
MARKET TALK:
Easing of Spot Prices for Raw Materials Could Lead to Slight Deflation in 2024
1139 GMT - Raw materials spot prices have further eased in May and could now potentially drive a slight cost deflation next year, analysts at JPMorgan say in a note. According to the U.S. bank, the decline in spot prices can be seen across most agri-commodities, as well as in packaging and European gas prices. "We now see overall food, HPC [household and personal care] and beverages cost of goods sold inflation set to be plus 6% in 2023 followed by minus 3% in 2024," the analysts say, adding the decline is expected to be mainly driven by household and personal care products due to the prices of oil derivatives like caustic soda, used to make cleaning products like soaps and detergents.(giulia.petroni@wsj.com)
---
ITM Power's Update Offers Comfort Given Recent Headwinds
1109 GMT - ITM Power confirmed earnings guidance and indicated its 12-month plan is on track, which is comforting given it stumbled through 2022 with headwinds hitting operational and commercial performance and a surprise CEO departure raising questions on the firm's near-term prospects, RBC Capital Markets says. The clean-fuel and energy-storage company's appointment of Dennis Schulz as its new CEO is positive and should facilitate a quick turnaround in a fast-growing electrolyzer market, RBC analysts say in a research note. "We rate the shares outperform given significant de-rating relative to peers, and potential for order pick-up in the calendar year ahead," the Canadian bank says. RBC retains its 260 pence price target on the stock. Shares are up 0.02 pence at 69.26 pence. (joseph.hoppe@wsj.com)
Contact: London NewsPlus, Dow Jones Newswires
(END) Dow Jones Newswires
June 01, 2023 12:12 ET (16:12 GMT)
Read more from the original source:
FTSE 100 Closes Up 0.6% as Mining, Oil Stocks Gain on Hopes of ... - Morningstar
Predictive Analytics: Revolutionizing Fraud Detection and Prevention – CityLife
Predictive Analytics: Revolutionizing Fraud Detection and Prevention
Predictive analytics is revolutionizing the way businesses detect and prevent fraud. By leveraging the power of advanced algorithms, machine learning, and big data, organizations can now predict and identify potential fraudulent activities before they even occur. This innovative approach to fraud detection and prevention is transforming industries and helping businesses protect their assets, customers, and reputation.
Fraud is a pervasive problem that affects businesses of all sizes and industries. In fact, according to the Association of Certified Fraud Examiners (ACFE), organizations lose an estimated 5% of their annual revenues to fraud. This amounts to a staggering $3.7 trillion in global losses. Traditional methods of fraud detection, such as manual reviews and rule-based systems, are no longer sufficient to combat the ever-evolving tactics of fraudsters. As a result, businesses are turning to predictive analytics to stay one step ahead of the criminals.
Predictive analytics involves the use of statistical techniques, machine learning algorithms, and data mining to analyze historical data and make predictions about future events. In the context of fraud detection, this means analyzing large volumes of transactional data to identify patterns and anomalies that may indicate fraudulent activity. By doing so, businesses can quickly detect and prevent fraud, minimizing financial losses and reputational damage.
One of the key advantages of predictive analytics is its ability to adapt to new and emerging fraud schemes. Traditional rule-based systems rely on pre-defined rules to identify potential fraud, which can be easily circumvented by savvy criminals. In contrast, predictive analytics models can automatically learn from new data and adjust their predictions accordingly. This makes them far more effective at detecting and preventing fraud, even as fraudsters continue to develop new tactics.
Another benefit of predictive analytics is its ability to reduce false positives. False positives occur when legitimate transactions are flagged as potentially fraudulent, leading to unnecessary investigations and customer dissatisfaction. Predictive analytics models can be fine-tuned to minimize false positives, ensuring that businesses can focus their resources on investigating genuine cases of fraud.
The financial services industry is one of the sectors that has been most significantly impacted by the adoption of predictive analytics for fraud detection and prevention. Banks, credit card companies, and other financial institutions are using predictive analytics to monitor transactions in real-time, flagging suspicious activity for further investigation. This has led to a significant reduction in losses due to fraud, as well as improved customer satisfaction and trust.
The insurance industry is another area where predictive analytics is making a significant impact. Insurers are using predictive models to identify potential cases of fraud, such as staged accidents or exaggerated claims. By detecting these fraudulent activities early, insurers can reduce their losses and maintain the integrity of their risk pools.
In addition to financial services and insurance, predictive analytics is being used to combat fraud in a wide range of industries, including healthcare, retail, and telecommunications. As businesses continue to generate and store vast amounts of data, the potential applications of predictive analytics for fraud detection and prevention will only continue to grow.
In conclusion, predictive analytics is revolutionizing the way businesses detect and prevent fraud. By leveraging advanced algorithms, machine learning, and big data, organizations can now predict and identify potential fraudulent activities before they even occur. This innovative approach is transforming industries and helping businesses protect their assets, customers, and reputation. As fraudsters continue to develop new tactics, predictive analytics will remain a critical tool in the ongoing battle against fraud.
View original post here:
Predictive Analytics: Revolutionizing Fraud Detection and Prevention - CityLife
MATES helping mates in mining – 2hd
A new report suggests the rate of suicide among male mining workers may be increasing.
The Suicide in the Australian Mining Industry: A National Study report, being launched today by the Federal Government at the Ravensworth Coal Mine near Singleton, shows the mining industry has been largely overlooked by suicide research.
The report from theUniversity of Melbournes School of Population and Global Health, was commissioned by MATES in Mining, Construction and Energy and is the first national study to look into suicide rates in the mining sector.
It estimates that suicide rates among mining workers is between 11 and 25 per 100-thousand workers and that rates of suicide among male mining workers may be increasing, while suicide rates for males across most other workplace categories show some decline.
MATES is a charity that was established in 2008 aiming to reduce the high level of suicide among Australian construction, energy and mining workers. MATES in Mining has rolled out a prevention program to address suicide and has so far had more than 4500 workers trained to give workers the skills to recognise the signs a workmate might be struggling with life.
MATES CEO Chris Lockwood said the report confirms why they need to be doing the work they are in the mining industry.
Those rates are not acceptable, we need to step up and do something.
The good thing is, we know we can do something about it. Any death by suicide has a real impact in the workplace, on everyone at the site, the family, the broader community, everyone in the Hunter would sadly know someone who has died by suicide.
Its a problem for all of us to step forward and do something about which is why having this research is really important to give us the confidence that not only do we know we have a problem but its the right thing that we are stepping forward to do something about it.
Weve been lucky that Glencore and others have stepped forward and said this is something we need to do something about, Chris Lockwood said.
So far, 4500 Glencore employees have gone through the training program rolled out by MATES.
Those workers that have been trained have developed an active community of care on site, those workers are mates looking after mates and when they see someone struggling they know how to step in, they have the skills and the confidence to get someone the help they need when they need it.
10 per cent or more of the workers who undertake the program step up as volunteers and become the active advocates for the program on site.
Theyre not only working on site, they live in the community in the Hunter, theyre the mums, dads, aunties, partners, uncles, theyre the footy coaches, theyre part of the community, so the skills they learn on site they take into the broader community so the work we are doing here is helping the whole Hunter step forward and tackle real issues, Chris Lockwood said.
He said MATES would now advocate for more detail on specific industries to be routinely collected in coronial data to enable more rigorous assessment of industry as well as occupational patterning of suicide.
If you or someone you know is struggling contact LIFELINE on 13 11 14
Continue reading here:
Governor Newsom Desperately Begs NetChoice To Drop Its Lawsuit … – Techdirt
from the this-is-embarrassing dept
Weve written a lot about AB 2273, Californias Age Appropriate Design Code (AADC) that requires websites with users in California to try to determine the ages of all their visitors, write up dozens of reports on potential harms, and then seek to mitigate those harms. Ive written about why its literally impossible to comply with the law. Weve had posts on how it conflicts with privacy laws and how its a radical experimentation on children (ironically, the drafters of the bill insist that theyre trying to stop experimentation on children).
Weve also written about how NetChoice, an internet company trade group, has sued to block the law as unconstitutional, and how I filed a declaration explaining how the law would violate the rights of both us at Techdirt and our users.
That lawsuit has continued to move forward, with California filing a pretty laughable reply saying that it doesnt regulate speech at all. NetChoice has filed its own reply as well, highlighting how ridiculous that is:
The State claims that AB 2273 regulates data managementnonexpressive conduct, Opp. 11not speech. Nonsense. AB 2273s text expressly requires services to mitigate or eliminate risks that a child could encounter potentially harmful content online. Content was the through-line in the legislative process: Defendant Attorney General Bonta praised the Act precisely because it would protect children from harmful material and dangerous online contentin other words, speechand Governor Newsom lauded the law for protect[ing] kids from harmful content. The States own expert, who mentions content in her declaration 71 times, derides preexisting laws specifically because they only cover data management, not content. Radesky Decl. 98. The State cannot evade the Constitution by pretending the Act regulates only business practices related to the collection and use of childrens personal information, Opp. 11, when the laws text, purpose, and effect are to regulate and shape online content. Like Californias last attempt to restrict the ideas to which children may be exposed, Brown v. Ent. Merchs. Assn, 564 U.S. 786, 792, 794 (2011), AB 2273 violates the First Amendment
It appears that Governor Newsom may have realized how badly this case is going to go for him. Days after NetChoice filed that reply, Newsom sent NetChoice an angry letter demanding that it drop the case.
The text is quite remarkable and bizarre. Newsom sounds angry. Perhaps because he realizes (per the above) that his own words in support of the bill and how it should be used to block content are going to make him lose this case.
Enough is enough. In light of new action and findings released by the U.S. Surgeon General, I urge you to drop your lawsuit challenging Californias childrens online safety law.
Except, as we just detailed, the Surgeon Generals report does not find that the internet harms kids, and actually makes it clear that most kids benefit from social media. Straight from the report that it appears Newsom did not read:
A majority of adolescents report that social media helps them feel more accepted (58%), like they have people who can support them through tough times (67%), like they have a place to show their creative side (71%), and more connected to whats going on in their friends lives (80%). In addition, research suggests that social media-based and other digitally-based mental health interventions may also be helpful for some children and adolescents by promoting help-seeking behaviors and serving as a gateway to initiating mental health care.
But, Newsom appears to have only read the headlines that misconstrue whats in the actual report. His letter then goes into full on moral panic mode:
Every day as our children browse the internet to connect with one another, build community, and learn, they are also pushed to horrific content and exposed to data mining and location tracking. This reality is dangerous to their safety, mental health, and well-being. Thats why, last September, I was proud to sign the California Age-Appropriate Design Code Act a bipartisan, first-in-the-nation law that protects the health and privacy of children using online platforms and prohibits online services from encouraging children to provide personal information.
Except, nearly everything in that paragraph is wrong. Embarrassingly so. There is no evidence that children are pushed to horrific content. It is true that there may be horrific content online, but the idea that companies are pushing kids to that content is not supported by the evidence. Furthermore, its rich that hes complaining about data mining and location tracking while saying that this bill prohibits companies from seeking personal information from kids when the laws age assurance requirements suggest the exact opposite. To comply with the law, websites will be effectively required to demand information from users to determine a likely age.
As I explained in my own declaration in the lawsuit, at Techdirt we have bent over backwards to learn as little about the folks who read our site as possible. But under the law, we will likely be compelled to institute a program in which we are required to determine the age of everyone who visits. In other words, the law requires more data mining, not less, and explicitly requires it for children.
Newsom continues the nonsense:
Rather than join California in protecting our children, your association, which represents major tech companies including Google, Meta, TikTok, and Twitter, chose to sue over this commonsense law. In your lawsuit, you have gone so far as to make light of the real harms our children face on the internet, trivializing this law as just being about teenagers who say unkind things, insufficiently like anothers posts, or are unhappy about the omission of a trigger warning.
Again, nothing in this law actually protects children. Instead, it puts them at much greater risk of having information exposed, as weve noted. It will also make it next to impossible for children to research important information regarding mental health, or to find out the information they need to help them deal with things like eating disorders, since it will drive basically all of that content offline (at least where kids can reach it).
As for the claim that NetChoice is trivializing this law, thats obviously bullshit to anyone who has read the filings in context (which apparently does not include this angry Governor Newsom). The references in that paragraph are in NetChoices motion for a preliminary injunction, but taken completely out of context. Theyre not trivializing the issues children face: theyre pointing out that the way the law is drafted (i.e., very, very badly), it also applies to those more trivial situations. From the preliminary injunction filing:
AB 2273 also adopts a boundless conception of what speech must be restricted, including speech that cannot constitutionally be restricted even for minors. The requirement that services enforce their own policies, id. 1798.99.31(a)(9), will lead them to suppress swaths of protected speech that the State could not restrict directly. See supra IV.A.1.b. The bar on using algorithms and user information to recommend or promote content will restrict a providers ability to transmit protected speech based on the users expressed interests. And the laws restrictions on content that might be detrimental or harmful to a childs well-being, id. 1798.99.31(a)(1)(b), (b)(1), (3)-(4), (7), could restrict expression on any topic that happens to distress any child or teen. This would include a range of important information children are constitutionally entitled to receive, such as commentary or news about the war in Ukraine, the January 6, 2021 insurrection at the United States Capitol, the 2017 Unite the Right rally in Charlottesville, school shootings, and countless other controversial, significant events.
More fundamentally, the harm the law seeks to addressthat content might damage someones well-beingis a function of human communication itself. AB 2273 applies to, among other things, communications by teenagers on social media, who may say unkind things, insufficiently like anothers posts, or complain harshly about events at school; the use of language acceptable to some but not others; the omission of a trigger warning; and any other manner of discourse online. See, e.g., Mahanoy Area Sch. Dist. v. B. L., 141 S. Ct. 2038 (2021) (Snapchat post fuck cheer made high school students visibly upset)
So, no. The lawsuit is not trivializing harms children face by saying that its nothing more than kids saying unkind things, NetChoice is (accurately) pointing out that the broad language of the law means that it could be applied to those situations, rather than ones dealing with actual harm.
Its pathetic and embarrassing that Newsom would imply that this paragraph was trivializing harms. His complete and total misread of whats in the lawsuit is trivializing the seriousness of his states own law that is violating 1st Amendment rights.
Anyway, Newsom goes on:
Yet at the same time you are in court callously mocking this law, experts are confirming the known dangers of online platforms for kids and teens: Just days ago, the U.S. Surgeon General issued an advisory on the profound toll that social media takes on kids and teens mental health without adequate safety and privacy standards. Your association and its members may be interested to learn of the Surgeon Generals urgent findings about the sexual extortion of our children, and the alarming links between youth social media and cyberbullying, depression, suicide, and unhealthy and dangerous outcomes and behaviors.
Honestly, this is making me wonder if Newsom ever reads anything. Because, as we discussed that is not what the Surgeon Generals report says at all. It literally says that there are widespread benefits to social media and then says we do not have enough evidence regarding whether or not its harmful. It notes there are concerns, and some correlational studies, but nothing proving a causal link. It notes that we need more research on that point.
So how the hell is Newsom claiming that it is claiming there is a profound toll from social media? The report does not say that.
As for the Surgeon Generals urgent findings about the sexual extortion of our children, again Newsom is blatantly misstating what the report says. It notes that the internet has been used for sexual extortion, which is a fact, but nothing in the AADC will stop bad people from being terrible. The report does not say anything about this fact being urgent or requiring social media companies to magically make people stop being bad. It just mentions such things as the kind of problematic content that exists online.
As for the alarming links between youth social media and cyberbullying, depression, suicide, and unhealthy and dangerous outcomes and behaviors thats AGAIN misreading the Surgeon Generals report. Again, it does mention those things, but does not discuss alarming links. It highlights correlational concerns again, and suggests further research and caution. But does not mention any sort of causal link, alarming or not.
In fact, with regards to cyberbullying, the Surgeon Generals recommendations talk about better educating teachers, parents, and children on how to deal with such things. And, its one policy recommendation around cyberbullying is not to force websites to censor content, as the AADC does, but rather to support the development, implementation, and evaluation of digital and media literacy curricular in schools and within academic standards.
In other words, what the Surgeon General is kinda saying is that our policy makers are the ones who have failed our kids by not teaching them how to be good digital citizens.
Governor Newsom, that ones on you.
So, so far we have Newsom lying about the law, lying about the filings from NetChoice, and now lying about the Surgeon Generals report. I know its a post-truth political world we live in, but I expect better from Californias governor.
But hes not done yet:
The harms of unregulated social media are established and clear.
The Surgeon Generals report not to mention the even more thorough report from the American Psychological Association literally say the opposite. They say it is not clear, and much more research needs to be done.
Governor Newsom, you should stop lying.
It is time for the tech industry to stop standing in the way of important protections for our kids and teens, and to start working with us to keep our kids safe.
Stomping on 1st Amendment rights and lying about everything is not keeping our kids safe Governor.
Filed Under: aadc, ab 2273, age appropriate, data, gavin newsom, moral panic, social media, studies, surgeon general, teenagersCompanies: netchoice
See the original post:
Governor Newsom Desperately Begs NetChoice To Drop Its Lawsuit ... - Techdirt
The Role of Data Mining in Healthcare & Why it Matters: A Brief – Solutions Review
Solutions Reviews Tim King offers a brief on the topic of data mining in healthcare, what it means in practical terms, and why its important.
Data mining plays a crucial role in healthcare by enabling the extraction of valuable insights and knowledge from large and complex healthcare datasets. It involves applying advanced analytical techniques and algorithms to uncover patterns, relationships, and trends within healthcare data. The overall role of data mining in healthcare can be summarized as follows:
Overall, data mining in healthcare plays a vital role in enhancing clinical decision-making, improving patient care, enabling early disease detection, optimizing resource allocation, and advancing medical research. It has the potential to transform healthcare systems by leveraging the power of data to drive evidence-based practices, improve efficiency, and ultimately improve patient outcomes.
The role of data mining in healthcare is significant due to several key reasons:
In summary, the role of data mining in healthcare is vital as it enhances patient outcomes, supports evidence-based medicine, optimizes resource allocation, facilitates early disease detection, combats healthcare fraud, advances medical research, and promotes data-driven decision-making. By leveraging the wealth of healthcare data, data mining empowers healthcare systems to provide more efficient, effective, and personalized care while improving population health.
Tim is Solutions Review's Executive Editor and leads coverage on data management and analytics. A 2017 and 2018 Most Influential Business Journalist and 2021 "Who's Who" in Data Management, Tim is a recognized industry thought leader and changemaker. Story? Reach him via email at tking@solutionsreview dot com.
Continue reading here:
The Role of Data Mining in Healthcare & Why it Matters: A Brief - Solutions Review
Major ocean database that will guide deep-sea mining has flaws … – Nature.com
Researchers have discovered a treasure trove of arthropods, such as these, on the sea floor in the ClarionClipperton Zone, located in the central and eastern Pacific Ocean.Credit: SMARTEX Project, Natural Environment Research Council, UK (smartexccz.org)
A company is expected to request authorization in July, for the first time ever, to mine the ocean floor for metals such as cobalt and nickel. At the same time, researchers warn that a crucial database that maps deep-sea biodiversity and that could factor into the decision to approve such a licence contains errors and data gaps.
Seabed mining is coming bringing mineral riches and fears of epic extinctions
The International Seabed Authority (ISA), a body associated with the United Nations that oversees deep-sea mining in international waters, currently allows only mining exploration. According to its website, it has approved 17 companies and government entities to study the mining potential of the ClarionClipperton Zone (CCZ), a region of the sea floor that spans up to 6 million square kilometres of the central and eastern Pacific Ocean and that holds metal-rich clumps of sediment. Nauru Ocean Resources, a subsidiary of The Metals Company, based in Vancouver, Canada, has been exploring the sea bed, with an eye towards gathering metals needed for electric-vehicle batteries and other electronics. It plans to apply for a commercial mining licence in a month or so. If approved, operations could begin in 2024.
Scientists worry about allowing companies to start mining the sea bed because little is known about deep-sea habitats and biodiversity, so its environmental effects are unpredictable.
The ISA runs a database called DeepData, which is meant to tackle some of these concerns, as well as to enable research projects. The database contains information that the ISA requires contractors to collect during their deep-sea exploration missions. These biological, geochemical and physical data include, for example, the species that they encounter and the chemicals present in the water.
But the analysis of DeepData, published in the journal Database on 30 March1, revealed flaws that worry the researchers who conducted the study.
Contractors would like to mine the sea bed for metal-rich clumps of sediment called polymetallic nodules.Credit: Courtesy of the NOAA Office of Ocean Exploration and Research, 2019 Southeastern U.S. Deep-sea Exploration.
It strikes me as irresponsible to be relying on the database in its current form to assess the impact of mining on the sea-floor environment, says Muriel Rabone, a data scientist at the Natural History Museum in London, who led the analysis. Rabone told Nature that the analysis was performed independently of the ISA, but that the agency cooperated to enable data access. It was also consulted on the scope of the study and an early draft of the manuscript.
The ISA protests some of the findings, however, saying that the report is out of date. On 12 July 2021, the researchers downloaded data collected in the CCZ to run their analysis. Since then, the ISA has made significant improvements to address quality assurance and control issues with DeepData, it says.
Responding to this criticism, Rabone maintains that the database still contains flaws. Even with its faults, its helping to point to thousands of species on the sea floor that had never been seen before results published just this week. There is work to do yet, she says.
Of the 40,518 records that the researchers analysed for the Database study, about one-quarter were duplicates, which could lead to an underestimation of species richness in the deep sea, they say. The scientists think duplicates can arise partially because the database lacks unique codes to identify individual records.
The ISA says that, like any database, DeepDatas features and the quality of its data are improving with the years due to technological advances. It adds that it has identified and corrected duplicate records. Also, it is collaborating with the World Register of Marine Species, which catalogues and classifies marine organisms, and is sharing data with the Ocean Biodiversity Information System a data hub that has helped to clean up the data and make them more widely available.
Brisingid sea stars, like this one, live on the sea floor in areas rich with metals.Credit: Courtesy of the NOAA Office of Ocean Exploration and Research, 2019 Southeastern U.S. Deep-sea Exploration
Looking at the database today, however, Rabone says that some duplicate data still exist, and that many records still do not have a unique identifier.
The team also found that DeepData contained inconsistent information for instance, records that catalogued two species under the same name. And a lot of environmental data were missing. When contractors submit their data, they use a form with fields such as species name and fauna class size. The researchers found that 90% of the total data in various fields were missing.
The ISA says it has already updated its forms to address some of these issues and is designing workshops and training for contractors to ensure that data quality and control are improved.
Scientists track damage from controversial deep-sea mining method
Rabone would like the workshops to be open to the scientific community, which she says can provide feedback on the database. Stefanie Kaiser, a deep-sea ecologist at Senckenberg Research Institute in Frankfurt, Germany, who was not involved with the study, agrees, and says that, if the database were improved, it could be useful for researchers, giving them access to all the information collected by the contractors.
But the ISA says workshops are for only contractors, because they provide the data, although it acknowledges that the academic community has assisted contractors with presentations and preparing annual reports.
Despite the disagreements over DeepData, researchers are already learning from the database. Rabone formed an official partnership with the ISA to lead the first census of metazoan biodiversity on the CCZs sea floor. The endeavour found more than 5,500 species in the region, of which 92% are new to science, including many worms and arthropods. The findings were published on 25 May in the journal Current Biology2.
Read the original post:
Major ocean database that will guide deep-sea mining has flaws ... - Nature.com
Top in-demand information technology jobs during hiring freezes – Times of India
In the face of challenging job markets and hiring freezes induced by the Covid-19 pandemic, the tech industry has demonstrated resilience and continued growth. Despite economic downturns, the demand for certain tech jobs remains high, as companies recognize the need for digital transformation, enhanced security measures, and innovation.
Despite the temporary slowdown in recruitment, the need for skilled tech talent persists, underpinned by the long-term vision of companies looking to position themselves for success in the post-pandemic era. As remote work becomes more prevalent and industries strive to meet the demands of a digital-first world, certain tech jobs have not only remained stable but have experienced increased demand.
Take a look into the top tech jobs that are in demand during the freezing hiring-
Cybersecurity professionals:
The increasing threat of cyber-attacks and the shift to remote work arrangements have elevated the demand for cybersecurity professionals. According to a study, the global cybercrime costs are projected to reach $10.5 trillion annually by 2025. This staggering statistic underscores the critical need for skilled cybersecurity analysts, ethical hackers, and information security managers. Organizations across industries are actively seeking experts to safeguard their sensitive data, protect their networks, and mitigate potential risks.
Data scientists and analysts:
In an era driven by data, the demand for data scientists and analysts has continued to soar. According to the U.S. Bureau of Labor Statistics, the employment of data scientists is projected to grow by 31% from 2019 to 2029, much faster than the average for all occupations. The ability to analyze vast amounts of data and derive actionable insights has become a strategic advantage for businesses. Data experts proficient in data mining, machine learning, and statistical analysis are instrumental in helping organizations make informed decisions and gain a competitive edge in the market.
Software developers and engineers:
Software developers and engineers play a crucial role in advancing technology and meeting evolving customer needs. Despite hiring freezes, the demand for these professionals remains strong. The U.S. Bureau of Labor Statistics projects a 22% increase in employment for software developers from 2019 to 2029, much faster than the average for all occupations. As organizations adapt to the digital landscape, there is an ongoing need for skilled developers to create new applications, maintain existing systems, and improve user interfaces. Additionally, expertise in cloud platforms has become increasingly valuable with the rise of cloud-based solutions.
AI and machine learning specialists:
Artificial Intelligence (AI) and Machine Learning (ML) have revolutionized various industries, driving demand for experts in these fields. The World Economic Forum predicts that AI will create 12 million new jobs by 2025. Companies are actively seeking AI and ML specialists to develop algorithms, build predictive models, and automate processes. These professionals are instrumental in driving innovation, improving operational efficiency, and enhancing customer experiences.
IT project managers:
Effective project management is crucial for the successful implementation of technology initiatives. According to the Project Management Institute, organizations waste $122 million for every $1 billion invested in projects due to poor project performance. Skilled IT project managers are in high demand, even during hiring freezes, as companies strive to ensure smooth project execution, manage resources efficiently, and meet deadlines. Project managers with expertise in Agile or Scrum methodologies are particularly sought after, as these frameworks enable flexibility and adaptability in uncertain times.
Conclusion
Despite the economic challenges caused by hiring freeze, the tech industry continues to offer numerous in-demand job opportunities. Cybersecurity professionals, data scientists and analysts, software developers and engineers, AI and ML specialists, and IT project managers are essential to drive innovation, enhance security measures, and ensure successful digital transformations. As you navigate the tech job market, consider acquiring or enhancing your skills in these high-demand areas to increase your employ.
Views expressed above are the author's own.
END OF ARTICLE
Here is the original post:
Top in-demand information technology jobs during hiring freezes - Times of India
Artificial intelligence terms professionals need to know – Thomson Reuters
Artificial Intelligence (AI) has exploded in the public mind over the last year, with many examples of AI-generated text, artwork and even full video. The talk of AI replacing entire industries is back at the front of the conversation with lawyers and accountants often mentioned as vulnerable.
Artificial intelligence is not going to replace experienced professionals right now, but people who can use AI effectively will quickly outpace those who cant. AI is changing how many people work and its here to stay. Your clients will need your AI insights, and your organization may need your AI knowledge.
So, how do you make sure it doesnt leave you behind?
You may find that you actually know more about AI than you thought you did that youve been using AI, every day, for many years. This article will explain the most common AI terminology you need to know to engage in the AI conversation in your workplace.
Artificial intelligence, or AI for short, is broadly defined as a branch of computer science that aims to develop intelligent machines, which can perform tasks that typically require human intelligence. This includes learning, problem-solving, decision making, etc. Examples of AI from everyday life range from maps and navigation to text editors and autocorrect to chatbots and digital assistants, like Siri.
An algorithm is a set of rules to be followed in calculations or other problem-solving operations, especially by a computer. In a math equation, an algorithm is the method we use to solve long division problems. A search engine, like Google, uses algorithms to find the most relevant information for the searcher.
Machine learning (ML) is a subset of AI that can learn without following explicit instructions by inferring patterns in data using statistical models and algorithms. Examples of ML include social media feeds, product recommendations, and image recognition.
Natural language processing (NLP) focuses on generating human language both spoken and written not robotic speech or restrictive text. Natural language processing applies algorithms to extract and analyze language data in a way that computers can process.It is imperative for machines to be able to process enormous amounts of data to be able to mine it and organize it and ultimately, to translate it and output human-seeming content.
Natural language search (NLS) is a type of search method that allows users to interact with a computer system or search engine using everyday language instead of formalized search queries or specific commands.Natural language search means that when youre searching for a new gym by searching for gym, your results will include most places that are focused on fitness, regardless of whether the name of the business actually includes the word gym. From a traditional gym, a CrossFit or yoga studio, Google understands that gym and studio in this instance have a similar meaning.
Your search inquiry doesnt have to be all inclusive (gym and studio and fitness and yoga and CrossFit and health and club) to get all-inclusive results. You get to type like a human, not a robot. And with a little help from machine learning, its going to keep your results local.
As a professional, it also means that when youre searching through research documents and briefs, you dont always have to use exact-match language to find precisely what youre looking for.
Data mining is the process of looking for relationships, correlations, and patterns within large data sets. Technology systems scour data and recognize anomalies within the data at a scale that would be impossible for humans. This analysis helps predict outcomes, finds potential wrongdoings, and notices questionable trends, and that information derived can be useful in a variety of ways.
Your recommendations (hopefully) keep getting better.By analyzing the patterns of people who also buy or are interested in the same products as you, a store can make relevant suggestions based on that data. This same concept plays out in Netflix recommendations or targeted advertisements online.
To put it simply,structureddata isorganizeddata, defined within a particular structure. It may be referred to as quantitative data. It is objective and easy to export to and store in Microsoft Excel or a larger database. The way it is organized is consistent and easily identifiable, which makes data mining better. Structured data is also less complicated to analyze and distill.
On the other hand, unstructured data isnt organized. It has no externally defined structure, and cannot be easily exported, stored, or organized. And its the bulk of what most organizations deal with daily. It includes most text-heavy data, such as reports, Microsoft Word documents, emails, and webpages.
Structured data has made it easy for you to complete searches and inquiries for decades.And because the data is organized and objective, you can be sure that the results you are shown are the most accurate.
For example, transactional data from a sales report e.g. Rep X sold Y units of product Z, for a total revenue this year of $$ is structured data, and easily analyzed. But that same reps detailed listing of feedback from new users of the product during implementation is unstructured, and has traditionally been difficult to examine, analyze, and quantify.
Recent advances in AI, such as Large Language Models and Foundation Models, have largely been about using vast repositories of unstructured data in new ways. See the companion article on machine learning for more details.
Big data refers to the data sets that are too large or complex to be handled by traditional data-processing software. Big data is a combination of structured, semi-structured, and unstructured data. Examples of big data include customer databases, all the information posted on a social media site, or trade data from the New York Stock Exchange.
Everything discussed above is generally well-understood and has been in use in many professional products for years decades in some cases. Remember the first time you typed a plain-language search to find what you needed? That was a type of AI. You should be relatively comfortable with these AI concepts, since youve been using them for years in your daily life, probably without even realizing.
But AI is not standing still. The consumer versions of Large Language Models have been all over the news, specifically ChatGPT and other chatbots. These AI technologies have the potential to disrupt the work of all professionals and you should be in the know. To stay on top of recent AI developments, visit our hub on artificial intelligence and read our companion article on generative AI and chat bots to learn more.
Read more:
Artificial intelligence terms professionals need to know - Thomson Reuters
Boeing working to absorb lessons from MAX crashes, improve safety – Lewiston Morning Tribune
SEATTLE As Boeing tries to emerge from the four-year shadow of two deadly 737 MAX crashes, executives on Tuesday described diverse efforts to improve its safety culture and avert future airplane accidents.
The companys Chief Aerospace Safety Officer Mike Delaney outlined progress toward sweeping reforms in how Boeing operates and how it supports airlines.
Javascript is required for you to be able to read premium content. Please enable it in your browser settings.
kAmq@6:?8 92D D6?E 6IA6C:6?465 A:=@ED 24C@DD E96 8=@36 E@ 6>365 H:E9 2:C=:?6 4FDE@>6CD 2?5 6?92?465 :ED EC2:?:?8 4@FCD6D 7@C A:=@ED 2?5 2:C4C27E >2:?E6?2?46 >6492?:4D]k^Am
kAm%96 4@>A2?J 😀 >:?:?8 7=:89E 52E2 E@ 2DD6DD 2?5 :56?E:7J 244:56?E C:D
kAmp ?6H |p) @A6C2E65 3J {:@? p:C 4C2D965 😕 x?5@?6D:2 😕 ~4E@36C a_`g] yFDE >@C6 E92? 7@FC >@?E9D =2E6C[ 2 D64@?5 ?6H ;6E 4C2D965 😕 tE9:@A:2[ H:E9 bce A6@A=6 <:==65 :? E96 EH@ 244:56?ED]k^Am
kAms6=2?6J DF886DE65 6?8:?66CD H9@ H@C<65 @? 56G6=@A>6?E @7 E96 |p) 2C6 DE:== 4@>:?8 E@ E6C>D H:E9 9@H q@6:?8 72:=FC6D 4@?EC:3FE65 E@ E96 4C2D96D]k^Am
kAm}@E 6G6CJ3@5J 92D A6C764E :?7@C>2E:@?[ s6=2?6J D2:5] }@E 6G6CJ3@5J H2D 😕 6G6CJ >66E:?8] }@E 6G6CJ3@5J H2D 😕 6G6CJ A2CE @7 E96 3FD:?6DD]k^Am
kAmpD A2CE @7 :ED 4F=EFC6 C6G2>A 2?5 AFD9 E@ 6?8286 6>A=@J66D[ q@6:?8 😀 =2F?49:?8 2? :?E6C?2= :?E6C24E:G6 H63D:E6 2 5:8:E2= D276EJ 6IA6C:6?46 E92E H:== AC@G:56 566A :?7@C>2E:@? @? 2== AC6G:@FD 2:C=:?6 244:56?ED[ :?4=F5:?8 E96 =6DD@?D =62C?65 7C@> 6249]k^Am
kAmp?5 :ED 56G6=@A:?8 2 G:56@ 7@C 6>A=@J66D DA64:7:42==J 23@FE E96 |p) 4C2D96D[ 2=E9@F89 H92E 6I24E=J H:== 36 :?4=F565 😀 DE:== 😕 AC@8C6DD]k^Am
kAm(96? x E2=< E@ A6@A=6 23@FE E96 fbf |p)[ x> ?@E :?E6C6DE65 😕 2E@?6>6?E] x> ?@E :?E6C6DE65 😕 C6EC:3FE:@?[ s6=2?6J D2:5] x> :?E6C6DE65 😕 >2<:?8 DFC6 E92E E96 q@6:?8 r@][ H96? :E 56D:8?D :ED ?6IE 2:CA=2?6[ 5@6D ?@E >2<6 2 7F?52>6?E2= 6?8:?66C:?8 >:DE2<6 @C AC@8C2> >2?286>6?E >:DE2<6 E92E H2D 4@?EC:3FE@CJ E@ 92G:?8 2? F?D276 4@?5:E:@? @? 2? 2:CA=2?6 E92E =625D E@ 2? 244:56?E]k^Am
kAm(6C6 ECJ:?8 E@ 7:8FC6 @FE 9@H 5@ H6 8@ 7@CH2C5 2?5 2=D@ >2<6 DFC6 H6 =62C?65 E96 =6DD@?D 7C@> E96 =2DE 76H J62CD[ s6=2?6J 25565]k^Am
kAmkDEC@?8m$FAA@CE 7@C A:=@EDk^DEC@?8mk^Am
kAmx? 2 ?6HD 3C:67:?8 H:E9 s6=2?6J[ {246J !:EE>2?[ q@6:?8 G:46 AC6D:56?E @7 E96 v=@32= p6C@DA246 $276EJ x?:E:2E:G6[ 56D4C:365 E96 4@>A2?JD >@G6D E@ 6IE6?5 :ED A2CE?6CD9:AD H:E9 2:C=:?6 4FDE@>6CD]k^Am
kAmw:DE@C:42==J[ q@6:?8 92D D6?E @FE 7:6=5 D6CG:46 C6AC6D6?E2E:G6D >2:?E6?2?46 E649?:4:2?D 2?5 6?8:?66CD E@ 2:C=:?6D 2C@F?5 E96 H@C=5 E@ 96=A 7:I E649?:42= AC@3=6>D H:E9 E96:C 2:CA=2?6D]k^Am
kAm}@H[ :E 😀 2=D@ @776C:?8 DFAA@CE E@ 7=:89E 4C6HD[ H9@D6 7=J:?8 6IA6C:6?46 G2C:6D H:56=J 24C@DD E96 8=@36]k^Am
kAmq@6:?8 92D 9:C65 `ad 9:89=J 6IA6C:6?465 A:=@ED 2D 7=:89E @A6C2E:@?D C6AC6D6?E2E:G6D] $@>6 @7 E96> 2C6 32D65 😕 E96 &]$] 2?5 D@>6 2C6 6>365565 H:E9 2:C=:?6D 2C@F?5 E96 8=@36 E@ 96=A 7=:89E 4C6HD E92E 7=J q@6:?8 ;6ED F?56CDE2?5 2== 2DA64ED @7 E96 ;@3]k^Am
kAms6=2?6J D2:5 E96 A:=@E D9@CE286 😀 9@=5:?8 324< 7FCE96C 9:C:?8]k^Am
kAm%96C6 2C6 D@>6 492==6?86D H:E9 ECJ:?8 E@ 8C@H E9:D E@ E96 D42=6 2?5 D:K6 H6 H2?E[ 96 D2:5] !:=@ED 2C6 2 D42C46 4@>>@5:EJ]k^Am
kAm|@DE @7 E9@D6 C64CF:E65 2C6 G6E6C2? A:=@ED H9@ 42? ?@ =@?86C 7=J 7@C 2? 2:C=:?6 3642FD6 E96JC6 @=56C E92? ed]k^Am
kAm}6G6CE96=6DD[ !:EE>2? D2:5 E96 ?6H 7=:89E @A6C2E:@?D C6AD 6?82865 H:E9 e_ 2:C=:?6D =2DE J62C]k^Am
kAm$96 D2:5 q@6:?8 2=D@ 😀 3F:=5:?8 D276EJ DFAA@CE E62>D E@ 36 DE2E:@?65 😕 D:I C68:@?D @7 E96 H@C=5]k^Am
kAm%96JC6 =:G:?8 😕 E96 C68:@?D[ 2?5 E96JC6 4@??64E65 H:E9 E96 C68F=2E@CD 2?5 E96 @A6C2E@CD 😕 E9@D6 C68:@?D[ !:EE>2? D2:5[ 255:?8 E92E E96D6 E62>D H:== 6?DFC6 E92E H6 2C6 2E E96 E23=6 2D H6 E2=< 23@FE D276EJ DEC2E68:6D :? 6249 C68:@? @7 E96 H@C=5]k^Am
kAmp55:E:@?2==J[ q@6:?8 92D 56G6=@A65 ?6H A:=@E EC2:?:?8 4@FCD6D E92E 8@ 36J@?5 E649?:42= 7=J:?8 23:=:EJ E@ :?4=F56 4@>>F?:42E:@? 36EH66? A:=@ED @? E96 7=:89E 564<[ =6256CD9:A D<:==D 2?5 3@E9 2FE@>2E:4 2?5 >2?F2= 7=:89E A2E9 >2?286>6?E]k^Am
kAm%96 |p) 244:56?ED 9:89=:89E65 E96 :>A@CE2?46 @7 EC2:?:?8 A:=@ED E@ H@C< E@86E96C E@ 92?5=6 7=:89E 4@?EC@= 6>6C86?4:6D]k^Am
kAm%C2:?:?8 4@FCD6D 7@C E96 fbf 2?5 E96 fgf 2C6 C@==65 @FE[ 2?5 q@6:?8 😀 AC6A2C:?8 ?6H 4@FCD6D 7@C :ED @E96C ;6E >@56=D]k^Am
kAmkDEC@?8mp?2=JE:4D E@ C6G62= C:D kAm':D9H2 &552?H25:<6C[ q@6:?8 G:46 AC6D:56?E @7 26C@DA246 D276EJ 2?2=JE:4D[ D9@H42D65 2 ?6H G:DF2= A=2E7@C> q@6:?8 92D 56G6=@A65 E@ 2?2=JK6 @A6C2E:@?2= 7=:89E 52E2 2?5 :56?E:7J EC6?5D 2?5 C:D kAmpE 2 C68F=2C H66<=J D276EJ >66E:?8[ q@6:?8D D6?:@C E649?:42= 2?5 D276EJ 6I64FE:G6D DEF5J E96 A=2E7@C> 52D93@2C5]k^Am kAm%@ :==FDEC2E6 9@H 52E2 >:?:?8 42? F?4@G6C C:D kAm(6 7@F?5 E92E 6G6? :7 E96J E@F49 5@H? @? E96 C:89E DA@E[ E96C6 2C6 4=@D6 42==D 5F6 E@ 2FE@ 3C2<6 D6EE:?8D @C ;FDE @A6C2E:@?2= 5:D4:A=:?6 :DDF6D[ &552?H25:<6C D2:5]k^Am kAmq@6:?8 😀 ?@H H@C<:?8 H:E9 :ED @A6C2E:@?2= 2?5 6?8:?66C:?8 E62>D E@ D66 9@H E9:D 42? 36 255C6DD65]k^Am kAm%96 4@>A2?JD 6?8:?66CD 2=D@ 56G:D65 2 >249:?6 =62C?:?8 2=8@C:E9> E@ 2?2=JK6 E96 D6CG:46 5:77:4F=EJ C6A@CED E92E 2:C=:?6D 7:=6 H:E9 E96 u656C2= pG:2E:@? p5>:?:DEC2E:@? 23@FE :?7=:89E :DDF6D[ DA64:7:42==J C6A@CED @7 423:? 56AC6DDFC:K2E:@?[ E@ D66 :7 E96C6 2C6 A2EE6C?D E92E 4@F=5 C6G62= H9J E96D6 :?4:56?ED @44FC]k^Am kAm%92E 2=8@C:E9> 😀 ?@H =:G6 @? E96 upp D6CG6CD[ =@@<:?8 2E 6G6CJ D6CG:46 5:77:4F=EJ C6A@CE[ &552?H25:<6C D2:5]k^Am kAmq@6:?8 😀 2=D@ FD:?8 52E2 >:?:?8 :?E6C?2==J E@ 2DD6DD BF2=:EJ :DDF6D H:E9:? E96 724E@C:6D]k^Am kAm(92E 92AA6?D :7 J@F 92G6 E@@ >F49 @G6CE:>6n (92E 92AA6?D :7 J@F 92G6 E@@ >F49 49FC? 😕 E96 E62>n &552?H25:<6C D2:5] %92E 52E2 42? C6G62= E96 :>A24E @? BF2=:EJ 2?5 E96? @? D276EJ]k^Am kAmkDEC@?8m!C@>@E:?8 D276EJ E@ 7C@?E=:?6 DE277k^DEC@?8mk^Am kAm&552?H25:<6C 2?5 s6=2?6J 56D4C:365 E96 677@CED F?56CH2J E@ C6249 @FE E@ 6G6CJ q@6:?8 6>A=@J66 2?5 4@?G6J E96 ?646DD2CJ D276EJ F?56CA:??:?8D @7 E96:C H@C<]k^Am kAmpE 2 3F:=5:?8 @? q@6:?8D tG6C6EE D:E6[ E96 4@>A2?J 92D 2 46?E6C D6E FA E@ 9:89=:89E =6DD@?D =62C?65 7C@> A2DE 2:C 244:56?ED] %@ AC@G:56 >@C6 2446DD[ :E 😀 =2F?49:?8 2 H63D:E6 @? E92E E96>6 7@C 6>A=@J66D]k^Am kAm%96 H63D:E6 AC6D6?ED 2 E:>6=:?6 @7 2== 2:C 244:56?ED 7@C H9:49 2 7:?2= :?G6DE:82E:@? C6A@CE 6I:DED] &D6CD 42? 5C:== 5@H? E@ @3E2:? 56E2:=D @? 2?J D:?8=6 4C2D9]k^Am kAmu@C 6I2>A=6[ 2? 6>A=@J66 >:89E 4=:4< @? @?6 @7 E96 >@DE H6==@H? 244:56?ED :? 2G:2E:@? 9:DE@CJi E96 4C2D9 @7 y2A2? p:C=:?6D u=:89E `ab :? `hgd]k^Am kAmp 72F=EJ C6A2:C E@ 2 3F=<9625 3J q@6:?8 >6492?:4D J62CD 62C=:6C 42FD65 2 >:52:C DECF4EFC2= 72:=FC6 2?5 564@>AC6DD:@? E92E =67E E96 A:=@ED H:E9 ?@ 4@?EC@=] (96? E96 fcf ;F>3@ ;6E 4C2D965 :?E@ 2 >@F?E2:?[ da_ A6@A=6 H6C6 <:==65]k^Am kAm%96 H63D:E6 AC@G:56D 7:CDE 2 G:DF2= >2A H:E9 =:? kAm%96 FD6C H:== 7:?5 E96 upp 5@4F>6?E @7 =6DD@?D =62C?65[ E96 }2E:@?2= %C2?DA@CE2E:@? $276EJ q@2C5 D276EJ C64@>>6?52E:@?D[ E96 244:56?E C6A@CE 7C@> E96 y2A2?6D6 2FE9@C:EJ[ E96 upp 2:CH@CE9:?6DD 5:C64E:G6 E92E H2D :DDF65 27E6C E96 4C2D9[ 2?5 2== E96 D276EJ 56D:8? AC24E:46D E92E H6C6 AFE 😕 A=246 3J q@6:?8 E@ 6?DFC6 :E 4@F=5 ?6G6C 92AA6? 282:?]k^Am kAm&552?H25:<6C D2:5 2== q@6:?8 6>A=@J66D H:== 92G6 2446DD 3J 62C=J yF?6]k^Am kAmp?5 E92E yp{ u=:89E `ab 244:56?E 😀 E96 DF3;64E @7 E96 7:CDE @7 2 D6C:6D @7 G:56@D q@6:?8 😀 AC6A2C:?8 7@C 6>A=@J66D E@ 4@?G6J E96 DE@CJ 2?5 :ED =6DD@?D]k^Am kAm&552?H25:<6C D2:5 E96 |p) 4C2D96D H:== 36 E96 DF3;64E @7 2 D64@?5 G:56@ 4FCC6?E=J 36:?8 AC@5F465]k^Am kAms6=2?6J D2:5 E96C6D `d_[___ q@6:?8 6>A=@J66D 2?5 G6CJ 76H @7 E96> 24EF2==J @H H92E C62==J 724EF2==J 92AA6?65 :? E96 56G6=@A>6?E @7 E96 |p)]k^Am kAmw6 56D4C:365 E96 H6==6DE23=:D965 G:6H 😕 E96 AF3=:4 >:?5 @7 H92E 42FD65 E96 |p) 4C2D96D 2D EH@5:>6?D:@?2=]k^Am kAmw6 H2D C676CC:?8 E@ E96 7=2H65 7=:89E 4@?EC@= DJDE6> @H? 2D E96 |2?6FG6C:?8 r92C24E6C:DE:4D pF8>6?E2E:@? $JDE6> E92E q@6:?8 25565 E@ E96 |p) E@ 4@>A6?D2E6 7@C E96 6IEC2 =:7E 😕 46CE2:? >2?6FG6CD 5F6 E@ E96 ;6ED >F49 =2C86C 6?8:?6D]k^Am kAmt?8:?66CD H@C<:?8 5FC:?8 62C=J 56G6=@A>6?E @7 E96 ;6E E@ DE23:=:K6 E96 7=:89E 4@?EC@= DJDE6> FD65 52E2 7C@> H:?5 EF??6= E6DED 😕 a_`` 2?5 a_`a[ s6=2?6J D2:5[ 2?5 E96:C 564:D:@?D 7C@> H92E H2D @H? E96? H6C6 G6CJ C2E:@?2=]k^Am kAmxE H2D @?=J 27E6C E96 4C2D96D[ 😕 a_`h[ E92E E9@D6 564:D:@?D H6C6 4C:E:BF65]k^Am kAmpD E:>6 8@6D @?[ A6@A=6 42? ?@H =@@< 324< 2?5 D2J[ ~z[ x H2D :? E96 >66E:?8 H96? H6 =@@<65 2E E96 52E2] x H2D :? E96 >66E:?8 H96? H6 =@@<65 2E E96 7:?2?4:2= DE2E6>6?ED] ~C x H2D :?G@=G65 😕 H92E 92AA6?65 36EH66? E96 7:CDE 244:56?E 2?5 E96 D64@?5[ s6=2?6J D2:5] qFE E92E E2<6D E:>6 2?5 5:DE2?46 E@ 92G6 E92E 4@?G6CD2E:@?]k^Am kAmq@6:?8 😀 ?@H 7C66 @7 >@DE @7 E96 =682= 4@?D6BF6?46D @7 E96 |p) 4C2D96D] %96 7656C2= 8@G6C?>6?E 5C@AA65 4C:>:?2= 492C86D 282:?DE E96 4@>A2?J[ 2?5 >@DE @7 E96 72>:=:6D @7 E9@D6 H9@ 5:65 92G6 2446AE65 D6EE=6>6?ED 😕 E96 4:G:= =:23:=:EJ 42D6D]k^Am kAmyFDE 2 76H 72>:=:6D 4@?E:?F6 E@ 7:89E E96 4:G:= 42D6D[ :?4=F5:?8 E92E @7 $2>J2 #@D6 $EF>@[ H9@ 5:65 😕 E96 tE9:@A:2? 4C2D9]k^Am kAm$2>J2D 72E96C[ |:4926= $EF>@[ @? (65?6D52J 5:D>:DD65 s6=2?6J 2D q@6:?8D 49:67 DA:? @77:46C]k^Am kAm%96 |p) 4C2D96D 925 >F=E:A=6 42FD6D[ 2?5 :ED ECF6 E92E E96 A:=@ED >:89E 92G6 92?5=65 E96 6>6C86?4:6D 36EE6C]k^Am kAmq@6:?8D =6256CD9:A 92D AF3=:4=J 25>:EE65 @?=J E92E E96 56D:8? @7 |rp$ >256 72=D6 2DDF>AE:@?D 23@FE 9@H A:=@ED H@F=5 C624E E@ 2? F?6IA64E65 2?5 72=D6 24E:G2E:@? @7 E96 DJDE6>]k^Am kAmxE 92D ?6G6C 25>:EE65 C6DA@?D:3:=:EJ 7@C @E96C 4@?EC:3FE:?8 724E@CD 46?EC2= E@ E96 244:56?E[ :?4=F5:?8ik^Am kAm%96 564:D:@? ?@E E@ @776C A:=@ED D:>F=2E@C EC2:?:?8 @? E96 |p) 2?5 :ED 5:D4@FC286>6?E @7 2:C=:?6D DF49 2D {:@? p:C E92E 2D<65 7@C D:>F=2E@C EC2:?:?8]k^Am kAm%96 7=2H65 6?8:?66C:?8 56D:8? @7 |rp$ E92E 2==@H65 :E E@ 24E:G2E6 H:E9 E96 72:=FC6 @7 2 D:?8=6 D6?D@C 2?5 E@ 4@?E:?F6 24E:G2E:?8 C6A62E65=J H96? 4@F?E6C65 3J E96 A:=@E]k^Am kAmq@6:?8D =24< @7 4=62C 4@>>F?:42E:@? @? |rp$ E@ E96 upp] x?7@C>2E:@? 23@FE E96 DJDE6> H2D 5:D4=@D65 5FC:?8 46CE:7:42E:@? 😕 2 7C28>6?E65 H2J E92E 6D42A65 ?@E:46]k^Am kAm(:== q@6:?8D G:56@ @? E96 |p) 4C2D96D 4@>AC696?D:G6=J 255C6DD E96 7F== D6E @7 4@?EC:3FE:?8 724E@CD 2?5 AC6D6?E 2 566A[ E9C665:>6?D:@?2= 2?2=JD:D @7 =6DD@?D =62C?65nk^Am kAm$A@<6DA6CD@? y6DD:42 z@H2= D2:5 %F6D52J E96 G:56@ :D 36:?8 56G6=@A65]k^Am kAmxED AC6>2EFC6 E@ D2J H92ED 8@:?8 E@ 36 😕 :E[ z@H2= D2:5]k^Am Link: Boeing working to absorb lessons from MAX crashes, improve safety - Lewiston Morning Tribune