Category Archives: Data Mining

New Report of Data Center Colocation Market with Size, Growth Drivers, Market Opportunities, Business Trends and Forecast to 2026 Industrial IT -…

Global Data Center Colocation Market Strategic recommendations, Trends, Segmentation, Use case Analysis, Competitive Intelligence, Global and Regional Forecast (to 2026)

Global Data Center Colocation market report gives a complete knowledge of Data Center Colocation Industry based on key parameters such as market size, revenue, sales analysis, and key drivers. The market size is anticipated to grow at a large scale over the forecast period (2021-2026). The primary focus of this study report is to give users an extensive insight into the market. So that users can apply strategic processes to benchmark themselves globally. Key drivers, as well as challenges of the market, are discussed in the report. Also, reports provide an in-depth analysis of the Data Center Colocation market with current and future trends.

Request for a sample copy of the report to get extensive insights into Data Center Colocation market at https://www.in4research.com/sample-request/295

Valuable Points Covered in Data Center Colocation Research Study are:

Major Players Covered in Data Center Colocation Market Report are:

How has the competitive landscape of this industry been categorized?

For more Customization, Connect with us at https://www.in4research.com/customization/295

Data Center Colocation Market Segmentation by Type, Application, and Region as follows:

Based on product, Data Center Colocation report displays the production, revenue, price, market share, and growth rate of each type, primarily split into:

Based on the end users/applications, Data Center Colocation report focuses on the status and outlook for major applications/end users, consumption (sales), market share and growth rate for each application, including:

Geographically, the detailed analysis of consumption, revenue, market share and growth rate, historic and forecast of the following regions are:

Any Questions/Queries or need help? Speak with our analyst https://www.in4research.com/speak-to-analyst/295

Impact of COVID-19:

Data Center Colocation Market report analyses the impact of Coronavirus (COVID-19) on the Data Center Colocation industry.Since the COVID-19 virus outbreak in December 2019, the disease has spread to almost 180+ countries around the globe with the World Health Organization declaring it a public health emergency. The global impacts of the coronavirus disease 2019 (COVID-19) are already starting to be felt and will significantly affect the Data Center Colocation market in 2020.

The outbreak of COVID-19 has brought effects on many aspects, like flight cancellations; travel bans, and quarantines; restaurants closed; all indoor events restricted; emergency declared in many countries; massive slowing of the supply chain; stock market unpredictability; falling business assurance, growing panic among the population, and uncertainty about future.

COVID-19 can affect the global economy in 3 main ways: by directly affecting production and demand, by creating supply chain and market disturbance, and by its financial impact on firms and financial markets.

Get the PDF to understand the CORONA Virus/COVID19 impact and be smart in redefining business strategies: https://www.in4research.com/impactC19-request/295

Major Points in Table of Content of Data Center Colocation Market Report are:

Part 01: Executive Summary

Part 02: Scope of The Report

Part 03: Data Center Colocation Market Landscape

Part 04: Data Center Colocation Market Sizing

Part 05: Five Forces Analysis

Part 06: Data Center Colocation Market Segmentation by Product Type

Part 07: Customer Landscape

Part 08: Geographic Landscape

Part 09: Decision Framework

Part 10: Drivers and Challenges

Part 11: Data Center Colocation Market Trends

Part 12: Competitive Landscape

Part 13: Competitive Analysis

Part 14: Appendix

Buy Full Report, Connect with us athttps://www.in4research.com/buy-now/295

For More Details Contact Us:

Contact Name: Rohan

Email: [emailprotected]

Phone: +1 (407) 768-2028

Global Multilayer Ceramic Capacitor Market Research Report 2021 Growth Share, Trends, Opportunities, Outlook & Forecast 2026

Latest Update on BIT Market Research Report by Growth Size, Key Segmentation and Competitive Landscape

Latest Update on Coffee Beans Market Research Report by Growth Size, Key Segmentation and Competitive Landscape

Coatings Resins Market to See Huge Growth During 2021-2026 Industry Analysis by Key Segments

Read the original post:

New Report of Data Center Colocation Market with Size, Growth Drivers, Market Opportunities, Business Trends and Forecast to 2026 Industrial IT -...

WISeKey to Invest up to $10 Million Over the Next Two Years – GlobeNewswire

WISeKey to Invest up to $10 Million Over the Next Two Years to Perform Bitcoin Mining From its Swiss Mountain Secure Bunker and Adapt its Cybersecurity Technologies to Defend Against Illicit Cryptocurrency Mining Activities

The crypto mining and cybersecurity mining operations will be performed via a Special Purpose vehicle already created in Zoug with the name TrusteCoin AGBenefits generated by Bitcoin mining process will be used to foster WISeKeys cybersecurity expertise on protecting its clients against illicit cryptocurrency mining activities

Bitcoin mining will be performed from WISeKeys Geneva Datacenter, and a former Swiss military bunker located in the Swiss Alps similar to the one filmed by Bloomberg back in 2014 https://youtu.be/xkWVxh-gRi8

Geneva, Switzerland - January 3, 2022 WISeKey International Holding Ltd, (WISeKey, SIX: WIHN / Nasdaq: WKEY), a Swiss cybersecurity, AI and IoT company announced today its plan to invest up to $10 million over the next two years, to perform Bitcoin mining from its Geneva datacenter and a former Swiss military bunker located in the Swiss Alps, aiming to adapt cybersecurity technologies to help its customers defend themselves against illicit cryptocurrency mining activities.

WISeKeys main objective of entering crypto mining operations is to help its clients protect against crypto jacking that occurs when malicious cyber actors effectively hijack the processing power of the devices and systems by exploiting vulnerabilities (in webpages, software, and operating systems), and illicitly install crypto mining software on victim devices and systems.

Crypto jacking involves maliciously installed programs that are persistent or non-persistent. Non-persistent crypto jacking usually occurs only while a user is visiting a particular webpage or has an internet browser open. Persistent crypto jacking continues to occur even after a user has stopped visiting the source that originally caused their system to perform mining activity. It is estimated that fifty out of every 100,000 devices have encountered a cryptocurrency miner.

WISeKeys crypto mining operations will be performed via a Special Purpose vehicle already created in Zoug with the name TrusteCoin AG. The objective will be to gradually acquire and install over one thousand bitcoin mining machines at its secure Swiss Alps bunker facilities that will be connected to a control center at WISeKey bunker in Geneva. WISeKey is also looking at other similar locations offering the same type of bunkers such as in Gibraltar and United States that will be gradually connected to the network taking into consideration regulatory and sustainability aspects.

After Chinas crypto space crackdown back in mid of 2021, the majority of the worlds bitcoin mining power settled in the United States. The local bitcoin mining industry now dominates the bitcoin mining market and produces over 35% of the worlds bitcoin mining hash rate and there is a great opportunity for cybersecurity companies to jump on this market with their technology. Through TrusteCoin AG, WISeKey is surfing the tide of blockchain and NFT interest through a crypto mining venture. The crypto mining services will be focused on simplifying consumer ownership of secure Bitcoin mining equipment through the integration of cybersecurity offered by WISeKey and smart-contract technologies to simplify the often-intimidating crypto mining process, while providing an affordable entry cost for WISeKey clients.

Since 1999, WISeKey was one of first ever companies to provide trusted, ultra-secure hosting using Swiss Alps bunkers. These ultra-secure bunkers facilities are adequate for critical-mission infrastructures and ideally located to perform Bitcoin mining.The WISeKey mountain bunkers facilities are Swiss military granite bunkers, built in the Swiss Alps to support the data even from nuclear catastrophes. These bunkers have beentransformed to provide an ultra-secure environment for bitcoin mining as they have IT security certifications from the ISO 27001 to the impressive EM-SHIELD seal, which certifies protection against electromagnetic pulse.

About WISeKeyWISeKey (NASDAQ: WKEY; SIX Swiss Exchange: WIHN) is a leading global cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT respecting the Human as the Fulcrum of the Internet. WISeKey microprocessors secure the pervasive computing shaping todays Internet of Everything. WISeKey IoT has an install base of over 1.6 billion microchips in virtually all IoT sectors (connected cars, smart cities, drones, agricultural sensors, anti-counterfeiting, smart lighting, servers, computers, mobile phones, crypto tokens etc.). WISeKey is uniquely positioned to be at the edge of IoT as our semiconductors produce a huge amount of Big Data that, when analyzed with Artificial Intelligence (AI), can help industrial applications to predict the failure of their equipment before it happens.

Our technology is Trusted by the OISTE/WISeKeys Swiss based cryptographic Root of Trust (RoT) provides secure authentication and identification, in both physical and virtual environments, for the Internet of Things, Blockchain and Artificial Intelligence. The WISeKey RoT serves as a common trust anchor to ensure the integrity of online transactions among objects and between objects and people. For more information, visit http://www.wisekey.com.

Press and investor contacts:WISeKey International Holding LtdCompany Contact: Carlos MoreiraChairman & CEOTel: +41 22 594 3000info@wisekey.com

WISeKey Investor Relations (US)Contact: Lena CatiThe Equity Group Inc.Tel: +1 212 836-9611lcati@equityny.com

Disclaimer:This communication expressly or implicitly contains certain forward-looking statements concerning WISeKey International Holding Ltd and its business. Such statements involve certain known and unknown risks, uncertainties, and other factors, which could cause the actual results, financial condition, performance, or achievements of WISeKey International Holding Ltd to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements. WISeKey International Holding Ltd is providing this communication as of this date and does not undertake to update any forward-looking statements contained herein as a result of new information, future events or otherwise.This press release does not constitute an offer to sell, or a solicitation of an offer to buy, any securities, and it does not constitute an offering prospectus within the meaning of article 652a or article 1156 of the Swiss Code of Obligations or a listing prospectus within the meaning of the listing rules of the SIX Swiss Exchange. Investors must rely on their own evaluation of WISeKey and its securities, including the merits and risks involved. Nothing contained herein is or shall be relied on as, a promise or representation as to the future performance of WISeKey.

Read the original post:

WISeKey to Invest up to $10 Million Over the Next Two Years - GlobeNewswire

Infrastructure Investments Need to Focus on Resilience to Generate Maximum Impact – Barron’s

Illustration by Andrea Ucini

Text size

Judith Rodin is the former president of the Rockefeller Foundation and of the University of Pennsylvania and has served on nine public-company boards. She is the author of The Resilience Dividend: Being Strong in a World Where Things Go Wrong.

New federal infrastructure dollars will be aimed at projects that are shovel worthy, not shovel ready, Transportation Secretary Pete Buttigieg told an audience recently.

Thats a critical distinction, because the law passed in November raises federal infrastructure spending to its highest share of GDP since the early 80s. Will the money help make the country more environmentally resilient and industrially competitive, as the legislation promises? And how should the financial markets and decision makers determine what makes an investment shovel worthy? The choices investors and policy makers make now will determine how effective this once-in-a-generation investment will be.

Investors piled into infrastructure stocks after the bill passed the House. But three factors suggest that a critical and significant strategy shift is needed.

First, following the COP26 United Nations climate summit, investors say they want to ratchet up blended finance, with public funds spurring private investment. Much of the infrastructure funding earmarked in the law provides great leverage for sustainability-focused investor capital. But there must be significant innovation in how government and the private sector work together to create the desired multiplier effect.

Second, as the federal money flows to state and local governments over the next five years, there are significant risks. Our ports are clogged, our roads need repair, and our bridges are failing. Our regional public transit is far surpassed by other countries. All of these act like a tax on business and our economy, as the New York Times put it.

Government investment can jumpstart solutions. But weve seen how local infrastructure projects run into huge delays and enormous cost overruns. The right government partners who have shown they can deliver, as well as rigorous project selection and management oversight, will be critical for investors. On the other hand, mayors and city commissioners have often taken the lead on innovation. To cite just one example, in Tallahassee, Fla., several hundred acres of undeveloped land at the airport were turned into a solar farm supplying power to City Hall, the airport terminal, a sewage treatment plant, and more. Miami-based Origis Energy owns and operates the system after installing it on the airports property. The infrastructure bill allocated $25 billion to airports, promising many more similarly innovative partnerships.

Third, both COP26 and the infrastructure act emphasize climate adaptation and resilience. Yet, a new report from Wellington Management notes that the investment community has been slow to focus on adaptation, given its traditional focus on short-term profits at the expense of long-term survival. But the climate crisis is no longer a far-away threat. To cite one of scores of growing vulnerabilities, McKinsey predicts that companies could face supply-chain disruptions lasting at least a month every 3.7 years. Its essential to focus more on both transparent risk-disclosure standards for investors and robust resilience planning for decision makers and asset owners.

Measuring a full array of resilience variables is critical to determining capacity to withstand climate impacts or, indeed, any crisis. For example, many business-continuity plans are insufficient when location makes infrastructure, such as the local power-supply lines or transit options, vulnerable to heavy winds, flooding, or wildfires. Few environmental assessments in the E of ESG account for these challenges. That is why I have argued for adding an R, resilience, to this metric.

New resilience-measurement frameworks and industry practices are emerging. For example, Boston Consulting Group has developed a source, make, deliver framework to help companies build resilience into global supply chains. This approach requires establishing more options for diversifying and regionalizing manufacturing and supply networks, adding more backup production and distribution capacity, and reoptimizing inventory.

When I was at the Rockefeller Foundation, we supported the development of resilience tools such as the City Resilience Index, which identifies 52 metrics that contribute to urban resilience. It could be readily adapted for companies and investors. Our work with the World Bank Group resulted in creating a resilience screen that helps investors evaluate infrastructure projects. Excellent AI-based data-mining tools, such as those developed by One Concern, are also emerging to measure resilience.

How we invest in and build new types of infrastructure to withstand more extreme weather, more failing systems, and more compounding shocks will determine whether this infrastructure law and all the private capital to be spent will build both greater resilience and greater economic growth for our future. Business as usual is a risk we cannot afford.

Guest commentaries like this one are written by authors outside the Barrons and MarketWatch newsroom. They reflect the perspective and opinions of the authors. Submit commentary proposals and other feedback to ideas@barrons.com.

Original post:

Infrastructure Investments Need to Focus on Resilience to Generate Maximum Impact - Barron's

Data Mining: Concepts and Techniques | ScienceDirect

Data Mining: Concepts and Techniques provides the concepts and techniques in processing gathered data or information, which will be used in various applications. Specifically, it explains data mining and the tools used in discovering knowledge from the collected data. This book is referred as the knowledge discovery from data (KDD). It focuses on the feasibility, usefulness, effectiveness, and scalability of techniques of large data sets. After describing data mining, this edition explains the methods of knowing, preprocessing, processing, and warehousing data. It then presents information about data warehouses, online analytical processing (OLAP), and data cube technology. Then, the methods involved in mining frequent patterns, associations, and correlations for large data sets are described. The book details the methods for data classification and introduces the concepts and methods for data clustering. The remaining chapters discuss the outlier detection and the trends, applications, and research frontiers in data mining.

This book is intended for Computer Science students, application developers, business professionals, and researchers who seek information on data mining.

Excerpt from:

Data Mining: Concepts and Techniques | ScienceDirect

Stopping Infection Outbreaks with AI and Big Data – IEEE Spectrum

Steven Cherry Hi this is Steven Cherry for IEEE Spectrums podcast, Fixing the Future.

Hospitals are where we go to get cured of infections and diseases, but sadly, sometimes tragically, and ironically, they are also places we go to get them. According to the U.S. Centers for Disease Control and Prevention, On any given day, about one in 31 hospital patients has at least one healthcare-associated infection.

Yet, according to Dr. Lee Harrison, The current method used by hospitals to find and stop infectious disease transmission among patients is antiquated. These practices havent changed significantly in over a century.

Until perhaps now. Doctors at UPMC, the University of Pittsburgh Medical Center, have developed a new method that uses three distinct, relatively new, technologies, whole genome sequencing surveillance, and machine learning, and electronic health records to identify undetected outbreaks and their transmission routes.

Dr. Lee Harrison is a Professor at the University of Pittsburgh, where hes the Associate Chief of Epidemiology and Education. and, more to our point today, the head of its Infectious Diseases Epidemiology Research Unit. Hes a co-author and corresponding author of a new paper that describes the new outbreak-detecting methodology, and hes my guest today.

Lee, welcome to the podcast.

Lee Harrison Thanks, Steven. Nice to be here.

Steven Cherry Maybe we could start with the practices that havent changed in over a century ... How do hospitals currently find and stop infectious disease transmissions?

Lee Harrison So, most hospitals use an approach that focuses on somebody noticing something, something happening. So, for example, a nurse on a particular nursing unit notices that there are three patients with C.diff

Steven Cherry And C.diff is

Lee Harrison is Clostridium difficile. Its a serious infection that occurs in patients who have had antibiotics, and typically well will alert the infection prevention folks in the hospital and then an investigation will be started.

Steven Cherry That 1-in-31 statistic is more than a little scary. Does that mean that if Im in the hospital for three days and nights, I have like a one in 10 chance of picking up an infection I wouldnt have gotten if I werent in the hospital?

Lee Harrison There are different ways that people get infections in the hospital. Sometimes the infections the patients get are actually from their own bodies. So, for example, if you come into the hospital and youre already colonized with MRSA, as an example, then if you have surgery, then you can develop a wound infection from that. But in other people, the infection acquired in the hospital is actually transmitted to them in the hospital. So theres two ways that patients get hospital-acquired infections. But yeah, they are quite common, as you cited in the CDC study.

Steven Cherry So this new system, which you and your colleagues call the Enhanced Detection System for Healthcare-Associated Transmission, or EDS-dash-HATwhich, by the way, that abbreviation works better on paper than over the airstarts by using genomic sequencing of all hospital infections as soon as theyre detected or suspected? How does that work?

Lee Harrison Yeah, so, we tried to make the acronym easy. We actually call it edhat. Yeah, the way it works is that we determined a long time ago that we were missing outbreaks by the traditional method. And so what we decided to do was combine several novel approaches. One is, as you pointed out, whole-genome sequencing surveillance. And the difference between that and what we currently do is reactive whole-genome sequencing. So in the scenario I painted before, when somebody in the hospital thinks theres an outbreak, we can get the bacteria from the suspected outbreak and do whole-genome sequencing and confirm or refute the outbreak. And what we find is a lot of times we refute the outbreak. It looks like there may be an outbreak, but when we do the sequencing, the cases are unrelated. So EDS-HAT uses whole-genome sequencing surveillance, which basically says anybody who has been in the hospital for at least three days and has one of our target high-impact bacterial infections, we go down to the clinical microbiology lab. We collect those bacteria and we sequence all of them.

Steven Cherry And then that sequencing is entered into the patients electronic health record?

Lee Harrison No, its not because the sequencing itself is not used for individual patient care. So the genetic makeup of the bacteria that theyre infected with really is not that relevant for the treatment because for treating, you just need to know what antibiotics will kill the bacteria, and thats what the clinicians will use. We keep a separate database of EDS-HAT whole-genome sequencing,

Steven Cherry I see. So the algorithms that look through the electronic health records, theyre doing a kind of contact tracing.

Lee Harrison Yeah, so thats a really good question. So the first step is the whole genome sequencing surveillance. And when we identify highly related bacteria, that tells us that there is an outbreak. It does not tell us whats causing the outbreak. And traditionally, you know, people would go into the electronic health record and fish around. But traditionally mostly would be looking for clusters that are occurring at the same time on the same nursing clinic. We know that misses a lot of outbreaks. So, the reason we go into the electronic health record is basically to identify that transmission route that is causing the outbreak that was identified by the sequencing.

Steven Cherry So the algorithms are looking for things like the proximity of two patients in terms of their hospital beds or whether they both had a procedure that uses the same equipment, or the same doctor or nurse treated them. So, all of that information is in the electronic health record, or is it somehow inferred by the algorithm?

Lee Harrison That information is in the electronic health records. So a really important thing about EDS-HAT, and this is in contrast to when youre investigating a community outbreak of, say, salmonella. If youre trying to figure out the transmission route in an outbreak of salmonella, youve got to track down the patients, hope they will answer the telephone, hope they remember where they were exposed to it. And so figuring out how transmission is occurring in the community is very difficult.

In the hospital, all of the epidemiology is available in the electronic health record: where they were, when they were there, who they had contact with through their roommates, or who their health care providers were. And importantly, any procedure that was done to them. So, when hospitals do a procedure, they need to get paid for it. So, they put a charge code in the electronic health record pretty quickly. And so, we can exploit all of that information to say, 'lets take our ten patients in a supposed outbreak defined by whole-genome sequencing surveillance. And lets compare them to all the other patients in the hospital and see which exposures are more common in the cases of the outbreak as compared to the rest of the patient population.' And thats how the data mining works and identifies those exposures that are likely causing these outbreaks.

Steven Cherry Were speaking with Dr Lee Harrison. When we come back, well talk about more about this data mining of electronic health records and about the infectious disease thats currently ravaging the entire planet.

Fixing the Future is supported by COMSOL, the makers of COMSOL Multiphysics simulation software. Companies like the Manufacturing Technology Centre are revolutionizing the designs of additive manufactured parts by first building simulation apps from COMSOL models, allowing them to share their analyses with different teams and explore new manufacturing opportunities with their own customers. Learn more about simulation apps and find this and other case studies at comsol.com/blog/apps.

Were back with my guest Dr Lee Harrison of the University of Pittsburghs Medical Center.

Steven Cherry Lee, I should disclose at this point that I have my own connection to the University of Pittsburgh. I teach there, though not at the Medical Center; Im in the English Department, but my primary care physician is a UPMC doctor, and last year I was in a UPMC hospital for kidney stones, so I guess I have my own stake in all this working.

Lee Harrison Interesting to know.

Steven Cherry So does this system involve there being a lot more information in the electronic health records than most hospitals currently have? Or could most hospitals start doing this right away?

Lee Harrison Yeah. I mean, the beauty of EDS-HAT is that we are mining data elements that are present in basically all electronic health records. And so the potential for expansion outside of UPMC, we think, is tremendous.

Steven Cherry There are no particular implications for patient privacy in all of this?

Lee Harrison Well, I mean, anytime you access medical data, you have to be very conscientious about how you treat those data. We are part of the infection prevention team and so we have access to electronic health records as part of our contributions to infection prevention at our hospital. But whenever youre dealing with electronic health record data, you have to be very aware of the regulations involving patient data.

Steven Cherry And are there any additional burdens placed on doctors and nurses? I mean, as you say, this uses information thats basically always in the health record to begin with. I mean, my understanding is that these electronic health records are a little bit intrusive, or at least doctors and nurses sometimes resent them as intruding in their relationships with their patients, and it takes an amount of time that they could be devoting to their patients in other ways.

Lee Harrison I think thats somewhat of a different issue. Yes. So, there has been some pushback about the amount of time needed to enter data and the electronic health record. I sort of view it differently. I remember an era when I was writing handwritten notes. My handwriting is illegible. Oftentimes, I was rounding [i.e., on rounds] with a team of infectious diseases fellows and residents and medical students, and theyd have to stand around and watch me write this illegible note. And it was a great waste of time. So now its much more efficient, in my view, where we can round on everybody and theneither back in my office or at home in the eveningI can put in my consult notes on whatever infectious disease patient Im seeing.

There are some downsides, but in my view, its a great improvement in how we care for patients, particularly because, you know, we used to roam around the hospital trying to find a patients chart. Now you can access a patients chart really anywhere. And so again, there are disadvantages, but I think its been a great improvement in how we care for patients.

Steven Cherry And lets just close the loop on how you how the system is actually used ... when you detect an outbreak and you do this sort of machine-learning contact tracing. Whats the next step to limit the outbreak?

Lee Harrison OK, so first of all, we have just completed a several-year validationdevelopment and validationof EDS-HAT. It had, up until now, in our hospital, run in the background, with a very long lag period. So we would wait six to 12 months to actually sequence the isolates. And the idea was that we would be able to compare it to running in the background with what we traditionally would do in terms of infection prevention.

Now that weve proven that EDS-HAT could potentially really make dramatic improvements to patient safety, we are just now moving it to [be] a real-time infection prevention tool. But the way it works is you identify an outbreak, you identifythrough the electronic health record, you identify the transmission route, and then we work hand in hand with our infection prevention team. So, anything that requires intervention, we immediately notify the infection prevention team so they can initiate the appropriate intervention. And that varies depending on what the transmission route is that weve identified.

Steven Cherry And if the transmission route is said to be people who use the same device, how would that work?

Lee Harrison Yes, thats a great example. So, one of the outbreaks we identified in this retrospective two-year analysis is a very serious set of infections caused by a contaminated gastroscope. When the machine-learning tells us that gastroscope is the likely transmission route and we manually go into electronic health record and say, how plausible is this? In this case, the patients had gastrostomy from the same gastroscope. And we also had other genetic evidence that in fact, it was the cause of the outbreak. So, the bottom line is you basically go and you remove that gastroscope from circulation and figure out why its causing the outbreak. In the case of a device like that, the intervention is basically 100 percent effective. You just stop using that device.

Steven Cherry Are there particular potential benefits to a system like this, if we should happen to be suffering a once in a century pandemic?

Lee Harrison Well, I mean, so separate from the pandemic. I mean, what weve shown is that this has potential to really improve patient safety by identifying. ... The most striking thing about our analysis is that we identified outbreaks that were very serious and that were unidentified by traditional approaches. And to me, thats the most striking fact.

We had an outbreak. It was occurring at interventional radiology that had been going on for at least a year and we have no idea when it started. It definitely wasnt identified by traditional methods. And also, you know, it allowed us to intervene immediately and stop the outbreak. So thats really the value of EDS-HAT. And the other thing that we found is that it has the potential to save hospitals money.

I was surprised by the result, but when you think about it, whole-genome sequencing is relatively cheap. And these infections that we can prevent are very, very expensive. So you dont have to prevent very many infections to pay for all the costs of running the system. We estimated we could have saved UPMC anywhere from just under $200,000 to just under $700,000 over the two-year period.

But I didnt understand your question about the relationship to the pandemic.

Steven Cherry Well, Im just wondering if theres intra-hospital transmission of COVID.

Lee Harrison Thats a great question. So before ...traditionally EDS-HAT has been for bacterial infections. And when Im rounding on the inpatient consult service for infectious diseases at our hospital, Ive noticed that, for example, you know, you have ... A patients been in the hospital for three months and all of a sudden they develop a respiratory syndrome. You test them and theyre positive for influenza. Now, you know, for a fact, they acquired that influenza in the hospital because theyve been in the hospital so long. So, before the pandemic started, we had just started to look at expanding EDS-HAT into respiratory viruses. And then when the pandemic hit, we rapidly pivoted to sequencing not only influenza, but also SARS-CoV-2. And the answer to your question is yes, there is value. There is evidence for transmission of SARS-CoV-2, just like other respiratory viruses, in the hospital. Weve shown that whole-genome sequencing can tell you how transmission of COVID and other respiratory illnesses is occurring in hospitals.

Steven Cherry And so, you know, if hypothetically, every hospital in an area were using this system, would it be possible to replace some of the human contact tracing and do it more efficiently?

Lee Harrison Yeah, thats a great question. So what were finding with EDS-HAT is that the data mining of the electronic health record can help us to identify transmission routes that are very difficult to identify by traditional EHR review. But were also finding that oftentimes the data mining results basically give us a listing or a ranking of likely transmission routes, and that does require some manual review to determine the plausibility of the various transmission routes that are being given to us. So the data mining is, I think, a huge innovation and a huge advance. But I dont think its ever going to [not] require that need for some human intervention to figure out the bestthe most likelytransmission route. And then decide what to do about it.

Steven Cherry If I could ask you one other question, more or less unrelated to this new system, in the midst of a once-in-a-century pandemic, its easy to forget other diseases and other vaccines. Recently the UK had a real-world test of a vaccine for meningitis B, the first large-scale test for children. You co-wrote an editorial for an article about this vaccine in the New England Journal of Medicine. Apparently, this is an incredibly dangerous disease. One of the papers authors is quoted as saying its one of the fastest, most vicious infections you can have. The child can be sneezing in the morning and be dead in the evening, even if they get to the hospital. Are you worried about the way vaccines are becoming politicized and refused, even as we seem to be entering a golden age of developing new vaccines for ancient, but still terrifying, diseases?

Lee Harrison Yeah, thats a great question. I view the politicization of vaccines as both irrational and very dangerous. Because what were seeing now with the COVID pandemic is that what your political beliefs are are somewhat correlated with whether youre getting vaccinated or not. And what were seeing is that is leading to a lot of unnecessary illness and deaths from COVID. And Im hoping that somehow we can move past this at some point because from a public health standpoint, its very, very concerning and its also not only the risk of the individual not getting vaccinated, but youre seeing whats happening in the US with the Delta variant. Were having still a devastating pandemic with almost 1200 deaths a day from COVID, and most of those are preventable by a very, very safe and effective vaccine.

Steven Cherry Well, Lee, I think anytime a new technology, or three different technologies woven together, can change the way weve been doing things for a century, its a pretty exciting development. Thank you for your role in making hospitals safer and for joining us today.

Lee Harrison Thanks for inviting me, Steve. Its really been a pleasure.

Fixing the Future is brought to you by IEEE Spectrum magazine and sponsored by COMSOL, makers of mathematical modeling software and a longtime supporter of IEEE Spectrum as a way to connect and communicate with engineers.

IEEE Spectrum is the member magazine of the Institute of Electrical and Electronic Engineers, a professional organization dedicated to advancing technology for the benefit of humanity.

This interview was recorded 9 December 2021, on Adobe Audition via Zoom, and edited in Audacity. Our theme music is by Chad Crouch.

You can subscribe to Fixing the Future wherever you get your podcasts, or listen on the Spectrum website, where youll also find transcripts of all our episodes. We welcome your feedback on the web or in social media, and your rating us at your favorite app.

For Fixing the Future, Im Steven Cherry.

See the original post:

Stopping Infection Outbreaks with AI and Big Data - IEEE Spectrum

The City Of Abilene And Taylor County To Build $2.4 Billion Data Center, Will Host Bitcoin Mining – Bitcoin Magazine

Today, Texass City of Abilene and Taylor County announced a large-scale partnership with Houston-based infrastructure company, Lancium, to build a $2.4 billion data center campus, per a press release sent to Bitcoin Magazine.

The data center campus, which will be powered by renewable energy, will host bitcoin mining and other energy-intensive applications. This project will begin at 200 megawatts of power, but has an expansion capacity of over 1 gigawatt.

We are very proud to be part of the community and build one of our flagship Clean Campuses in Abilene, said Michael McNamara, cofounder and CEO of Lancium. We chose Abilene for our second Clean Campus because of its ideal location, proximity to abundant wind and solar generation, high-quality workforce and the opportunities to grow in the future. We want to thank the city, county and all of the members of the economic development team that worked together to help make this significant milestone possible.

The construction of this new facility is set to break ground on about 800 acres of land in Abilene and Taylor County, starting in Q1, 2022. The data center is expected to bring in about $993.4 million in total economic impact to Abilene and Taylor County, according to the release.

This project brings immense value to our community as it is truly shaping our future, said Jack Rich, Development Corporation of Abilene board chair. We are fortunate to have community resources that support the needs of companies like Lancium.

The rest is here:

The City Of Abilene And Taylor County To Build $2.4 Billion Data Center, Will Host Bitcoin Mining - Bitcoin Magazine

Greenville planning board recommends city code changes that will permit cryptomining operations – Greenville Daily Reflector

Compute North is working with Greenville officials to locate a data mining facility in the community after intense opposition from residents in the Belvoir area forced the company to give up its plans to locate a facility there.

The Greenville Planning and Zoning Commission voted unanimously at its Tuesday meeting to recommend changes to the city code that would permit modular data processing facility and data processing center as two separate uses in the city. The changes also set standards and zoning districts where the facilities could be located.

The recommendation now goes to Greenville City Council for final approval.

Kristyan Mjolsnes, Compute North vice president of marketing, confirmed Friday that the company was still looking for possible locations in the Greenville-Pitt County area.

As we shared and committed at the last (Pitt County) commissioners meeting, we are focusing on locations that are zoned industrial, Mjolsnes said. The size/scale of the facility is expected to be similar, however, that will be finalized as we work towards a preferred site and related development approvals.

There was no discussion during Tuesdays meeting about where Compute North might locate.

Compute North was not discussed by name during Tuesdays meeting, but two company officials, Jeff Jackson, vice president for development and Patty Varra, site development manager, were presented as subject matter experts.

Are we getting ready to learn about data mining? commission chairman Kevin Faison asked when Chief Planner Chantae Gooby began her presentation.

Yes you are. I feel like youve done a lot of my work for me, Gooby said. "This is a relatively new use. Weve had to add this to our ordinance and in the process educate ourselves about it.

Data processing centers are defined as a large group of computer systems and accessory components housed in a building. The equipment is used for remote storage, processing or distribution of large amounts of data.

A data processing facility is a space, which can be inside or outside a building, where modular structures house large groups of computer systems and accessory components. The modular structures are typically cooled with a collection of fans built into each unit.

Modular data processing facilities are an intensive land use because its rows of modular structures will have fans and possibly generators operating, Gooby said.

Gooby said the fans are on the outside of the modular data processing facility some may have generators depending on the type of facility it is.

The proposed new rules will state that equipment and structures shall not exceed 35 feet and all equipment and structures must be 100-feet from the property line. All wiring has to be located underground, Gooby said.

Because the site will have a utilitarian look, larger vegetative buffer yards are required to cut down on the visual aspects. If a facility is near a residential, multifamily classification , there will be a 50-foot wide buffer yard and, for every 100 linear feet, eight large evergreens, 10 small evergreens and 36 small shrubs will be required.

While Greenville has a noise ordinance within its city limits, its industrial park is located outside the city limits so its noise ordinance would not apply there, Gooby said.

The proposed new rules would apply the citys noise ordinance of below 65 decibels near residential property and below 75 decibels near industrial property to modular data processing facilities, Gooby said

Sound walls can be used to reduce sound levels.

Since data processing centers are contained in buildings, its land use classification isnt as intensive. That use can be permitted in various office, commercial, industrial and fixed institution districts but not in the medical districts, Gooby said.

The same noise regulations will apply to the center as the modular facilities.

Uconda Dunn, vice president of business development with the Greenville-Eastern North Carolina Alliance, urged the commission to support the recommended changes to the city code.

Its become evident that the tech sector is an open and available market for Greenville, Dunn said. As we continue to work to diversify our industrial base it has become apparent to us that we need to address this ordinance to reflect sectors that we see are growing and are opportunities to attract to our local community.

A couple of commission members asked staff if any other municipalities in eastern North Carolina had data processing facilities and what their rules were.

Gooby said she knew of no North Carolina communities with data processing facilities so planning staff researched communities across the United States, including Kearny, Nebraska, where Compute North has a facility similar to the one it wanted to build in Belvoir.

There is no uniformity in the standards, Gooby said, because the industry is new.

Faison asked how many jobs would be generated by a data processing facility and what would its tax base be.

Jackson, the Compute North vice president, said the company expects to invest $55 million in the project and hire 15 people. Jackson said the company hasnt calculated its new tax revenue projections.

Last fall Compute North sought a special use permit to open data processing facility with 89 containers cooled by more than 1,000 fans near Belvoir Elementary School. The company faced fierce opposition from parents who believed noise from the fans would disturb students and from activists upset that the company did little outreach to the areas majority African-American and Hispanic residents.

Other individuals worried about the sites environmental impact because it requires large quantities of electricity. There were also concerns the site could drive up electric rates as a facility in New York state did in one community.

Greenville Utilities Commission officials said there is sufficient electric resources to supply Compute North.

When asked Thursday if GUC was continuing to work with Compute North to locate in the area, General Manager and CEO Tony Cannon said, Due to the competitive nature of business and industrial recruitment, we do not discuss any details, including the identity, of a potential business or industry, unless or until there is a public announcement regarding the same or the matter comes up for approval in a public bodys open session.

Read the original here:

Greenville planning board recommends city code changes that will permit cryptomining operations - Greenville Daily Reflector

These will be the 5 most in-demand tech jobs in 2022 – VentureBeat

It might be hard to believe but 2022 is just around the corner. While many of us are still stuck in March 2020 (at least in our minds), the world of tech has gone through a mammoth amount of change since the pandemic.

From remote working to the Zoom boom, the way we work, communicate with our colleagues, and even search for new jobs have all completely changed. Of course, Covid-19 has also spurred on The Great Resignation.

Over the last two years, many people have reevaluated their priorities, examined their careers, and contemplated making a change. As a result, were facing a hiring explosion unlike anything we have ever seen before.

So, if youre wondering what the most in demand tech jobs will be in 2022, look no further. Weve rounded up a list of the five jobs to consider. Now all you have to do is start applying. Good luck!

Java developers create web applications, software, and programmes. They are involved throughout the entire development life cycle of a product. This job is always in high demand and we predict that plenty of companies will be hiring for this role in the new year.

The responsibilities of a Java developer will vary greatly depending on the company and specific position. Typical duties include designing, implementing, and maintaining Java applications, delivering high availability and performance, contributing in all phases of the development life cycle, writing well-designed, efficient, and testable code, to name but a few.

Check out some open Java Developer roles near you here.

A cloud architect is an IT professional who is responsible for overseeing a companys cloud computing strategy. This includes cloud adoption plans, cloud application design, and cloud management and monitoring. Often, Cloud Architects are also responsible for bridging the gaps between complex business problems and solutions in the cloud.

Necessary cloud architect skills will include experience with programming languages such as Python, Ruby and Elixir, a background in IT engineering and excellent leadership skills.

Do you think you have what it takes? You can find some open cloud architect roles on Jobbio.

Product Managers oversee the development of projects from the planning stage right through to completion. Usually, theyre the glue that holds teams together and make sure that everyone is on the right track. Its a varied role and PMs will cover everything from supervising the task flow to holding regular meetings with staff to check-in on progress.

When companies are searching for candidates for this role, there are a few things that they will be looking for such as strong analytical skills, management experience, high levels of organization and experience using tools like PivotalTracker or Jira.

If this sounds like the right gig for you, then you can take a look at companies hiring right now here.

Cybersecurity is more important now than ever. Cybersecurity specialists are basically bodyguards that protect companies from attacks from hackers and customers from having their information stolen. Without a team of top IT security specialists, companies risk losing huge sums of money in data breaches and a headache from unhappy customers.

Cybersecurity specialists need problem-solving skills, knowledge of security across various platforms, great communication skills, and fundamental computer forensics skills. If youve got what it takes it can be a hugely rewarding job with relatively high salaries.

You can find some cybersecurity roles here.

A data scientists job is to use machine learning to predict and analyze data. Specific tasks include things like identifying data-analytics problems, determining the correct data sets and variables, collecting large sets of data, and communicating findings to stakeholders. Data science is a growing field and one that is sure to continue to develop over the next few years.

To be eligible for this role, youll need to be familiar with statistical programming languages such as R, Python, and SLQ. Youll also need to have knowledge of data mining techniques. If you tick those boxes, then why not consider a career change in 2022?

Here are some brilliant companies that are currently hiring for data scientists on Jobbio.

Continue reading here:

These will be the 5 most in-demand tech jobs in 2022 - VentureBeat

Excessive alcohol consumption is life-threatening, particularly during holidays – Daily Mining Gazette

HOUGHTON An article published in the Dec. 20 edition of the Daily Mining Gazette titled Christmas and alcohol can be a toxic formula, addressed a relationship between excessive drinking during the holidays and arguments between family members. What the article did not address is the hazards that accompany intoxication at holiday gatherings and parties.

Despite being the most wonderful time of the year, Cherry Digital Content reported in a Dec. 14 email, statistics show that the festive period is the deadliest on Americas roads.

In 2018, in one week alone, there were 285 deaths due to drunk driving according to the National Highway Traffic Safety Administration (NHTSA). On New Years Day, drunk driving-related deaths skyrocket to 129% above the baseline average, making it the most dangerous holiday of the year in terms of intoxicated road use.

In Michigan, the situation has become so critical that more than half of residents polled reported they will choose to spend the night with family rather than risk being struck by a drunk driver.

A survey conducted by DesertHopeTreatment.com, a leading provider of addiction treatment, polled 3,510 Americans revealing that almost two-thirds of Michiganders (63%) will choose to stay over with family at Christmas in order to avoid drunk drivers on roads and highways this year. That is significantly above the national average of 59%.

Given that Christmas Eve and Christmas Day are on a Friday and Saturday this year, suggested cherrydigitalcontent.com, it may be the wisest choice to stay over, if possible, considering 62% of drunk driving-related fatalities occur over the weekend.

Choosing not to drive on Christmas Eve is not an overreaction. The Michigan State Police website reports that Impaired Driving in 2019 accounted for:

Alcohol- and Drug-Related Fatalities, 419.

Fatalities, 985.

Injuries, 74,963.

Total Crashes, 314,377.

The Dec. 20 Daily Mining Gazette article was posted to a social media page with the purpose of maligning it. One respondent, Ceric Lasentri, posted the comment:

Facepalms at this tabloid level crap. Especially before the holidays. Way to p**s in the punch, bud. Lets kick off this weekends festivities with an air of *SSHOLE about us. Its S**T like this, that feeds the negativity. And you know the old saying The demon or angel you feed the most prevails.

Yet, on August 18, 2020 a study by the Centers for Disease Control and Prevention (CDC), found that excessive alcohol consumption is responsible for an average of 93,296 deaths in the U.S. every year (255 per day), shortening the lives of these people by an average of 29 years (2.7 million years of potential life lost).

Michigan is eighth highest in terms of total deaths among all 50 states and 17th highest in age-adjusted alcohol-attributable deaths per 100,000-population, the CDC reported.

In consideration of these new data, the report stated, the Michigan Liquor Control Commission today urges moderation in alcohol consumption.

These findings are a huge wake-up call toward keeping alcohol consumption in check, MLCC Chair Pat Gagliardi is quoted as saying in the report.

The CDC reports that 55% of these premature, preventable deaths are from long-term drinking that causes various cancers, liver disease, heart disease, and other health problems. Overall, 71 percent of these premature deaths are among men, and 56 percent are people ages 35 to 64. Not surprisingly, alcoholic liver disease was the leading chronic cause of alcohol-attributable deaths overall, most predominantly among men.

Excessive alcohol consumption at holiday parties and social events is included in what is termed binge drinking. Binge drinking was addressed in the CDC study.

Michigans alcohol epidemiologist, Patrick Hindman, drew attention to the rising prevalence of binge drinking, the report stated.

These new data are a reflection of drinking patterns, particularly binge drinking, as approximately 90 percent of adults who report excessive drinking, binge drink. According to a January 2020 CDC report, there were significant increases in total binge drinks per adult from 2011 to 2017 among adults who reported binge drinking for both men and women, and those aged 35-44 years (up 26.7 percent) and 45-64 years (up 23.1%).

EDITORS NOTE: Tomorrow, the Daily Mining Gazette will examine the impact of drinking parents on minor children.

Today's breaking news and more in your inbox

Here is the original post:

Excessive alcohol consumption is life-threatening, particularly during holidays - Daily Mining Gazette

What Kind Of Investors Own Most Of BIT Mining Limited (NYSE:BTCM)? – Simply Wall St

Every investor in BIT Mining Limited (NYSE:BTCM) should be aware of the most powerful shareholder groups. Insiders often own a large chunk of younger, smaller, companies while huge companies tend to have institutions as shareholders. Warren Buffett said that he likes "a business with enduring competitive advantages that is run by able and owner-oriented people." So it's nice to see some insider ownership, because it may suggest that management is owner-oriented.

BIT Mining is a smaller company with a market capitalization of US$497m, so it may still be flying under the radar of many institutional investors. Our analysis of the ownership of the company, below, shows that institutions own shares in the company. Let's take a closer look to see what the different types of shareholders can tell us about BIT Mining.

Check out our latest analysis for BIT Mining

Many institutions measure their performance against an index that approximates the local market. So they usually pay more attention to companies that are included in major indices.

As you can see, institutional investors have a fair amount of stake in BIT Mining. This can indicate that the company has a certain degree of credibility in the investment community. However, it is best to be wary of relying on the supposed validation that comes with institutional investors. They too, get it wrong sometimes. When multiple institutions own a stock, there's always a risk that they are in a 'crowded trade'. When such a trade goes wrong, multiple parties may compete to sell stock fast. This risk is higher in a company without a history of growth. You can see BIT Mining's historic earnings and revenue below, but keep in mind there's always more to the story.

Hedge funds don't have many shares in BIT Mining. The company's largest shareholder is Tsinghua Holdings Corporation Limited, with ownership of 20%. Meanwhile, the second and third largest shareholders, hold 15% and 5.0%, of the shares outstanding, respectively. Man San Law, who is the second-largest shareholder, also happens to hold the title of Senior Key Executive.

After doing some more digging, we found that the top 13 have the combined ownership of 50% in the company, suggesting that no single shareholder has significant control over the company.

While studying institutional ownership for a company can add value to your research, it is also a good practice to research analyst recommendations to get a deeper understand of a stock's expected performance. We're not picking up on any analyst coverage of the stock at the moment, so the company is unlikely to be widely held.

The definition of company insiders can be subjective and does vary between jurisdictions. Our data reflects individual insiders, capturing board members at the very least. Company management run the business, but the CEO will answer to the board, even if he or she is a member of it.

Most consider insider ownership a positive because it can indicate the board is well aligned with other shareholders. However, on some occasions too much power is concentrated within this group.

Our most recent data indicates that insiders own a reasonable proportion of BIT Mining Limited. Insiders have a US$75m stake in this US$497m business. This may suggest that the founders still own a lot of shares. You can click here to see if they have been buying or selling.

The general public-- including retail investors -- own 48% stake in the company, and hence can't easily be ignored. While this size of ownership may not be enough to sway a policy decision in their favour, they can still make a collective impact on company policies.

We can see that Private Companies own 20%, of the shares on issue. It might be worth looking deeper into this. If related parties, such as insiders, have an interest in one of these private companies, that should be disclosed in the annual report. Private companies may also have a strategic interest in the company.

It's always worth thinking about the different groups who own shares in a company. But to understand BIT Mining better, we need to consider many other factors. To that end, you should learn about the 4 warning signs we've spotted with BIT Mining (including 3 which are potentially serious) .

If you would prefer check out another company -- one with potentially superior financials -- then do not miss this free list of interesting companies, backed by strong financial data.

NB: Figures in this article are calculated using data from the last twelve months, which refer to the 12-month period ending on the last date of the month the financial statement is dated. This may not be consistent with full year annual report figures.

Have feedback on this article? Concerned about the content? Get in touch with us directly. Alternatively, email editorial-team (at) simplywallst.com.

This article by Simply Wall St is general in nature. We provide commentary based on historical data and analyst forecasts only using an unbiased methodology and our articles are not intended to be financial advice. It does not constitute a recommendation to buy or sell any stock, and does not take account of your objectives, or your financial situation. We aim to bring you long-term focused analysis driven by fundamental data. Note that our analysis may not factor in the latest price-sensitive company announcements or qualitative material. Simply Wall St has no position in any stocks mentioned.

See original here:

What Kind Of Investors Own Most Of BIT Mining Limited (NYSE:BTCM)? - Simply Wall St