Page 2,408«..1020..2,4072,4082,4092,410..2,4202,430..»

Stopping Infection Outbreaks with AI and Big Data – IEEE Spectrum

Steven Cherry Hi this is Steven Cherry for IEEE Spectrums podcast, Fixing the Future.

Hospitals are where we go to get cured of infections and diseases, but sadly, sometimes tragically, and ironically, they are also places we go to get them. According to the U.S. Centers for Disease Control and Prevention, On any given day, about one in 31 hospital patients has at least one healthcare-associated infection.

Yet, according to Dr. Lee Harrison, The current method used by hospitals to find and stop infectious disease transmission among patients is antiquated. These practices havent changed significantly in over a century.

Until perhaps now. Doctors at UPMC, the University of Pittsburgh Medical Center, have developed a new method that uses three distinct, relatively new, technologies, whole genome sequencing surveillance, and machine learning, and electronic health records to identify undetected outbreaks and their transmission routes.

Dr. Lee Harrison is a Professor at the University of Pittsburgh, where hes the Associate Chief of Epidemiology and Education. and, more to our point today, the head of its Infectious Diseases Epidemiology Research Unit. Hes a co-author and corresponding author of a new paper that describes the new outbreak-detecting methodology, and hes my guest today.

Lee, welcome to the podcast.

Lee Harrison Thanks, Steven. Nice to be here.

Steven Cherry Maybe we could start with the practices that havent changed in over a century ... How do hospitals currently find and stop infectious disease transmissions?

Lee Harrison So, most hospitals use an approach that focuses on somebody noticing something, something happening. So, for example, a nurse on a particular nursing unit notices that there are three patients with C.diff

Steven Cherry And C.diff is

Lee Harrison is Clostridium difficile. Its a serious infection that occurs in patients who have had antibiotics, and typically well will alert the infection prevention folks in the hospital and then an investigation will be started.

Steven Cherry That 1-in-31 statistic is more than a little scary. Does that mean that if Im in the hospital for three days and nights, I have like a one in 10 chance of picking up an infection I wouldnt have gotten if I werent in the hospital?

Lee Harrison There are different ways that people get infections in the hospital. Sometimes the infections the patients get are actually from their own bodies. So, for example, if you come into the hospital and youre already colonized with MRSA, as an example, then if you have surgery, then you can develop a wound infection from that. But in other people, the infection acquired in the hospital is actually transmitted to them in the hospital. So theres two ways that patients get hospital-acquired infections. But yeah, they are quite common, as you cited in the CDC study.

Steven Cherry So this new system, which you and your colleagues call the Enhanced Detection System for Healthcare-Associated Transmission, or EDS-dash-HATwhich, by the way, that abbreviation works better on paper than over the airstarts by using genomic sequencing of all hospital infections as soon as theyre detected or suspected? How does that work?

Lee Harrison Yeah, so, we tried to make the acronym easy. We actually call it edhat. Yeah, the way it works is that we determined a long time ago that we were missing outbreaks by the traditional method. And so what we decided to do was combine several novel approaches. One is, as you pointed out, whole-genome sequencing surveillance. And the difference between that and what we currently do is reactive whole-genome sequencing. So in the scenario I painted before, when somebody in the hospital thinks theres an outbreak, we can get the bacteria from the suspected outbreak and do whole-genome sequencing and confirm or refute the outbreak. And what we find is a lot of times we refute the outbreak. It looks like there may be an outbreak, but when we do the sequencing, the cases are unrelated. So EDS-HAT uses whole-genome sequencing surveillance, which basically says anybody who has been in the hospital for at least three days and has one of our target high-impact bacterial infections, we go down to the clinical microbiology lab. We collect those bacteria and we sequence all of them.

Steven Cherry And then that sequencing is entered into the patients electronic health record?

Lee Harrison No, its not because the sequencing itself is not used for individual patient care. So the genetic makeup of the bacteria that theyre infected with really is not that relevant for the treatment because for treating, you just need to know what antibiotics will kill the bacteria, and thats what the clinicians will use. We keep a separate database of EDS-HAT whole-genome sequencing,

Steven Cherry I see. So the algorithms that look through the electronic health records, theyre doing a kind of contact tracing.

Lee Harrison Yeah, so thats a really good question. So the first step is the whole genome sequencing surveillance. And when we identify highly related bacteria, that tells us that there is an outbreak. It does not tell us whats causing the outbreak. And traditionally, you know, people would go into the electronic health record and fish around. But traditionally mostly would be looking for clusters that are occurring at the same time on the same nursing clinic. We know that misses a lot of outbreaks. So, the reason we go into the electronic health record is basically to identify that transmission route that is causing the outbreak that was identified by the sequencing.

Steven Cherry So the algorithms are looking for things like the proximity of two patients in terms of their hospital beds or whether they both had a procedure that uses the same equipment, or the same doctor or nurse treated them. So, all of that information is in the electronic health record, or is it somehow inferred by the algorithm?

Lee Harrison That information is in the electronic health records. So a really important thing about EDS-HAT, and this is in contrast to when youre investigating a community outbreak of, say, salmonella. If youre trying to figure out the transmission route in an outbreak of salmonella, youve got to track down the patients, hope they will answer the telephone, hope they remember where they were exposed to it. And so figuring out how transmission is occurring in the community is very difficult.

In the hospital, all of the epidemiology is available in the electronic health record: where they were, when they were there, who they had contact with through their roommates, or who their health care providers were. And importantly, any procedure that was done to them. So, when hospitals do a procedure, they need to get paid for it. So, they put a charge code in the electronic health record pretty quickly. And so, we can exploit all of that information to say, 'lets take our ten patients in a supposed outbreak defined by whole-genome sequencing surveillance. And lets compare them to all the other patients in the hospital and see which exposures are more common in the cases of the outbreak as compared to the rest of the patient population.' And thats how the data mining works and identifies those exposures that are likely causing these outbreaks.

Steven Cherry Were speaking with Dr Lee Harrison. When we come back, well talk about more about this data mining of electronic health records and about the infectious disease thats currently ravaging the entire planet.

Fixing the Future is supported by COMSOL, the makers of COMSOL Multiphysics simulation software. Companies like the Manufacturing Technology Centre are revolutionizing the designs of additive manufactured parts by first building simulation apps from COMSOL models, allowing them to share their analyses with different teams and explore new manufacturing opportunities with their own customers. Learn more about simulation apps and find this and other case studies at comsol.com/blog/apps.

Were back with my guest Dr Lee Harrison of the University of Pittsburghs Medical Center.

Steven Cherry Lee, I should disclose at this point that I have my own connection to the University of Pittsburgh. I teach there, though not at the Medical Center; Im in the English Department, but my primary care physician is a UPMC doctor, and last year I was in a UPMC hospital for kidney stones, so I guess I have my own stake in all this working.

Lee Harrison Interesting to know.

Steven Cherry So does this system involve there being a lot more information in the electronic health records than most hospitals currently have? Or could most hospitals start doing this right away?

Lee Harrison Yeah. I mean, the beauty of EDS-HAT is that we are mining data elements that are present in basically all electronic health records. And so the potential for expansion outside of UPMC, we think, is tremendous.

Steven Cherry There are no particular implications for patient privacy in all of this?

Lee Harrison Well, I mean, anytime you access medical data, you have to be very conscientious about how you treat those data. We are part of the infection prevention team and so we have access to electronic health records as part of our contributions to infection prevention at our hospital. But whenever youre dealing with electronic health record data, you have to be very aware of the regulations involving patient data.

Steven Cherry And are there any additional burdens placed on doctors and nurses? I mean, as you say, this uses information thats basically always in the health record to begin with. I mean, my understanding is that these electronic health records are a little bit intrusive, or at least doctors and nurses sometimes resent them as intruding in their relationships with their patients, and it takes an amount of time that they could be devoting to their patients in other ways.

Lee Harrison I think thats somewhat of a different issue. Yes. So, there has been some pushback about the amount of time needed to enter data and the electronic health record. I sort of view it differently. I remember an era when I was writing handwritten notes. My handwriting is illegible. Oftentimes, I was rounding [i.e., on rounds] with a team of infectious diseases fellows and residents and medical students, and theyd have to stand around and watch me write this illegible note. And it was a great waste of time. So now its much more efficient, in my view, where we can round on everybody and theneither back in my office or at home in the eveningI can put in my consult notes on whatever infectious disease patient Im seeing.

There are some downsides, but in my view, its a great improvement in how we care for patients, particularly because, you know, we used to roam around the hospital trying to find a patients chart. Now you can access a patients chart really anywhere. And so again, there are disadvantages, but I think its been a great improvement in how we care for patients.

Steven Cherry And lets just close the loop on how you how the system is actually used ... when you detect an outbreak and you do this sort of machine-learning contact tracing. Whats the next step to limit the outbreak?

Lee Harrison OK, so first of all, we have just completed a several-year validationdevelopment and validationof EDS-HAT. It had, up until now, in our hospital, run in the background, with a very long lag period. So we would wait six to 12 months to actually sequence the isolates. And the idea was that we would be able to compare it to running in the background with what we traditionally would do in terms of infection prevention.

Now that weve proven that EDS-HAT could potentially really make dramatic improvements to patient safety, we are just now moving it to [be] a real-time infection prevention tool. But the way it works is you identify an outbreak, you identifythrough the electronic health record, you identify the transmission route, and then we work hand in hand with our infection prevention team. So, anything that requires intervention, we immediately notify the infection prevention team so they can initiate the appropriate intervention. And that varies depending on what the transmission route is that weve identified.

Steven Cherry And if the transmission route is said to be people who use the same device, how would that work?

Lee Harrison Yes, thats a great example. So, one of the outbreaks we identified in this retrospective two-year analysis is a very serious set of infections caused by a contaminated gastroscope. When the machine-learning tells us that gastroscope is the likely transmission route and we manually go into electronic health record and say, how plausible is this? In this case, the patients had gastrostomy from the same gastroscope. And we also had other genetic evidence that in fact, it was the cause of the outbreak. So, the bottom line is you basically go and you remove that gastroscope from circulation and figure out why its causing the outbreak. In the case of a device like that, the intervention is basically 100 percent effective. You just stop using that device.

Steven Cherry Are there particular potential benefits to a system like this, if we should happen to be suffering a once in a century pandemic?

Lee Harrison Well, I mean, so separate from the pandemic. I mean, what weve shown is that this has potential to really improve patient safety by identifying. ... The most striking thing about our analysis is that we identified outbreaks that were very serious and that were unidentified by traditional approaches. And to me, thats the most striking fact.

We had an outbreak. It was occurring at interventional radiology that had been going on for at least a year and we have no idea when it started. It definitely wasnt identified by traditional methods. And also, you know, it allowed us to intervene immediately and stop the outbreak. So thats really the value of EDS-HAT. And the other thing that we found is that it has the potential to save hospitals money.

I was surprised by the result, but when you think about it, whole-genome sequencing is relatively cheap. And these infections that we can prevent are very, very expensive. So you dont have to prevent very many infections to pay for all the costs of running the system. We estimated we could have saved UPMC anywhere from just under $200,000 to just under $700,000 over the two-year period.

But I didnt understand your question about the relationship to the pandemic.

Steven Cherry Well, Im just wondering if theres intra-hospital transmission of COVID.

Lee Harrison Thats a great question. So before ...traditionally EDS-HAT has been for bacterial infections. And when Im rounding on the inpatient consult service for infectious diseases at our hospital, Ive noticed that, for example, you know, you have ... A patients been in the hospital for three months and all of a sudden they develop a respiratory syndrome. You test them and theyre positive for influenza. Now, you know, for a fact, they acquired that influenza in the hospital because theyve been in the hospital so long. So, before the pandemic started, we had just started to look at expanding EDS-HAT into respiratory viruses. And then when the pandemic hit, we rapidly pivoted to sequencing not only influenza, but also SARS-CoV-2. And the answer to your question is yes, there is value. There is evidence for transmission of SARS-CoV-2, just like other respiratory viruses, in the hospital. Weve shown that whole-genome sequencing can tell you how transmission of COVID and other respiratory illnesses is occurring in hospitals.

Steven Cherry And so, you know, if hypothetically, every hospital in an area were using this system, would it be possible to replace some of the human contact tracing and do it more efficiently?

Lee Harrison Yeah, thats a great question. So what were finding with EDS-HAT is that the data mining of the electronic health record can help us to identify transmission routes that are very difficult to identify by traditional EHR review. But were also finding that oftentimes the data mining results basically give us a listing or a ranking of likely transmission routes, and that does require some manual review to determine the plausibility of the various transmission routes that are being given to us. So the data mining is, I think, a huge innovation and a huge advance. But I dont think its ever going to [not] require that need for some human intervention to figure out the bestthe most likelytransmission route. And then decide what to do about it.

Steven Cherry If I could ask you one other question, more or less unrelated to this new system, in the midst of a once-in-a-century pandemic, its easy to forget other diseases and other vaccines. Recently the UK had a real-world test of a vaccine for meningitis B, the first large-scale test for children. You co-wrote an editorial for an article about this vaccine in the New England Journal of Medicine. Apparently, this is an incredibly dangerous disease. One of the papers authors is quoted as saying its one of the fastest, most vicious infections you can have. The child can be sneezing in the morning and be dead in the evening, even if they get to the hospital. Are you worried about the way vaccines are becoming politicized and refused, even as we seem to be entering a golden age of developing new vaccines for ancient, but still terrifying, diseases?

Lee Harrison Yeah, thats a great question. I view the politicization of vaccines as both irrational and very dangerous. Because what were seeing now with the COVID pandemic is that what your political beliefs are are somewhat correlated with whether youre getting vaccinated or not. And what were seeing is that is leading to a lot of unnecessary illness and deaths from COVID. And Im hoping that somehow we can move past this at some point because from a public health standpoint, its very, very concerning and its also not only the risk of the individual not getting vaccinated, but youre seeing whats happening in the US with the Delta variant. Were having still a devastating pandemic with almost 1200 deaths a day from COVID, and most of those are preventable by a very, very safe and effective vaccine.

Steven Cherry Well, Lee, I think anytime a new technology, or three different technologies woven together, can change the way weve been doing things for a century, its a pretty exciting development. Thank you for your role in making hospitals safer and for joining us today.

Lee Harrison Thanks for inviting me, Steve. Its really been a pleasure.

Fixing the Future is brought to you by IEEE Spectrum magazine and sponsored by COMSOL, makers of mathematical modeling software and a longtime supporter of IEEE Spectrum as a way to connect and communicate with engineers.

IEEE Spectrum is the member magazine of the Institute of Electrical and Electronic Engineers, a professional organization dedicated to advancing technology for the benefit of humanity.

This interview was recorded 9 December 2021, on Adobe Audition via Zoom, and edited in Audacity. Our theme music is by Chad Crouch.

You can subscribe to Fixing the Future wherever you get your podcasts, or listen on the Spectrum website, where youll also find transcripts of all our episodes. We welcome your feedback on the web or in social media, and your rating us at your favorite app.

For Fixing the Future, Im Steven Cherry.

See the original post:

Stopping Infection Outbreaks with AI and Big Data - IEEE Spectrum

Read More..

These will be the 5 most in-demand tech jobs in 2022 – VentureBeat

It might be hard to believe but 2022 is just around the corner. While many of us are still stuck in March 2020 (at least in our minds), the world of tech has gone through a mammoth amount of change since the pandemic.

From remote working to the Zoom boom, the way we work, communicate with our colleagues, and even search for new jobs have all completely changed. Of course, Covid-19 has also spurred on The Great Resignation.

Over the last two years, many people have reevaluated their priorities, examined their careers, and contemplated making a change. As a result, were facing a hiring explosion unlike anything we have ever seen before.

So, if youre wondering what the most in demand tech jobs will be in 2022, look no further. Weve rounded up a list of the five jobs to consider. Now all you have to do is start applying. Good luck!

Java developers create web applications, software, and programmes. They are involved throughout the entire development life cycle of a product. This job is always in high demand and we predict that plenty of companies will be hiring for this role in the new year.

The responsibilities of a Java developer will vary greatly depending on the company and specific position. Typical duties include designing, implementing, and maintaining Java applications, delivering high availability and performance, contributing in all phases of the development life cycle, writing well-designed, efficient, and testable code, to name but a few.

Check out some open Java Developer roles near you here.

A cloud architect is an IT professional who is responsible for overseeing a companys cloud computing strategy. This includes cloud adoption plans, cloud application design, and cloud management and monitoring. Often, Cloud Architects are also responsible for bridging the gaps between complex business problems and solutions in the cloud.

Necessary cloud architect skills will include experience with programming languages such as Python, Ruby and Elixir, a background in IT engineering and excellent leadership skills.

Do you think you have what it takes? You can find some open cloud architect roles on Jobbio.

Product Managers oversee the development of projects from the planning stage right through to completion. Usually, theyre the glue that holds teams together and make sure that everyone is on the right track. Its a varied role and PMs will cover everything from supervising the task flow to holding regular meetings with staff to check-in on progress.

When companies are searching for candidates for this role, there are a few things that they will be looking for such as strong analytical skills, management experience, high levels of organization and experience using tools like PivotalTracker or Jira.

If this sounds like the right gig for you, then you can take a look at companies hiring right now here.

Cybersecurity is more important now than ever. Cybersecurity specialists are basically bodyguards that protect companies from attacks from hackers and customers from having their information stolen. Without a team of top IT security specialists, companies risk losing huge sums of money in data breaches and a headache from unhappy customers.

Cybersecurity specialists need problem-solving skills, knowledge of security across various platforms, great communication skills, and fundamental computer forensics skills. If youve got what it takes it can be a hugely rewarding job with relatively high salaries.

You can find some cybersecurity roles here.

A data scientists job is to use machine learning to predict and analyze data. Specific tasks include things like identifying data-analytics problems, determining the correct data sets and variables, collecting large sets of data, and communicating findings to stakeholders. Data science is a growing field and one that is sure to continue to develop over the next few years.

To be eligible for this role, youll need to be familiar with statistical programming languages such as R, Python, and SLQ. Youll also need to have knowledge of data mining techniques. If you tick those boxes, then why not consider a career change in 2022?

Here are some brilliant companies that are currently hiring for data scientists on Jobbio.

Continue reading here:

These will be the 5 most in-demand tech jobs in 2022 - VentureBeat

Read More..

Excessive alcohol consumption is life-threatening, particularly during holidays – Daily Mining Gazette

HOUGHTON An article published in the Dec. 20 edition of the Daily Mining Gazette titled Christmas and alcohol can be a toxic formula, addressed a relationship between excessive drinking during the holidays and arguments between family members. What the article did not address is the hazards that accompany intoxication at holiday gatherings and parties.

Despite being the most wonderful time of the year, Cherry Digital Content reported in a Dec. 14 email, statistics show that the festive period is the deadliest on Americas roads.

In 2018, in one week alone, there were 285 deaths due to drunk driving according to the National Highway Traffic Safety Administration (NHTSA). On New Years Day, drunk driving-related deaths skyrocket to 129% above the baseline average, making it the most dangerous holiday of the year in terms of intoxicated road use.

In Michigan, the situation has become so critical that more than half of residents polled reported they will choose to spend the night with family rather than risk being struck by a drunk driver.

A survey conducted by DesertHopeTreatment.com, a leading provider of addiction treatment, polled 3,510 Americans revealing that almost two-thirds of Michiganders (63%) will choose to stay over with family at Christmas in order to avoid drunk drivers on roads and highways this year. That is significantly above the national average of 59%.

Given that Christmas Eve and Christmas Day are on a Friday and Saturday this year, suggested cherrydigitalcontent.com, it may be the wisest choice to stay over, if possible, considering 62% of drunk driving-related fatalities occur over the weekend.

Choosing not to drive on Christmas Eve is not an overreaction. The Michigan State Police website reports that Impaired Driving in 2019 accounted for:

Alcohol- and Drug-Related Fatalities, 419.

Fatalities, 985.

Injuries, 74,963.

Total Crashes, 314,377.

The Dec. 20 Daily Mining Gazette article was posted to a social media page with the purpose of maligning it. One respondent, Ceric Lasentri, posted the comment:

Facepalms at this tabloid level crap. Especially before the holidays. Way to p**s in the punch, bud. Lets kick off this weekends festivities with an air of *SSHOLE about us. Its S**T like this, that feeds the negativity. And you know the old saying The demon or angel you feed the most prevails.

Yet, on August 18, 2020 a study by the Centers for Disease Control and Prevention (CDC), found that excessive alcohol consumption is responsible for an average of 93,296 deaths in the U.S. every year (255 per day), shortening the lives of these people by an average of 29 years (2.7 million years of potential life lost).

Michigan is eighth highest in terms of total deaths among all 50 states and 17th highest in age-adjusted alcohol-attributable deaths per 100,000-population, the CDC reported.

In consideration of these new data, the report stated, the Michigan Liquor Control Commission today urges moderation in alcohol consumption.

These findings are a huge wake-up call toward keeping alcohol consumption in check, MLCC Chair Pat Gagliardi is quoted as saying in the report.

The CDC reports that 55% of these premature, preventable deaths are from long-term drinking that causes various cancers, liver disease, heart disease, and other health problems. Overall, 71 percent of these premature deaths are among men, and 56 percent are people ages 35 to 64. Not surprisingly, alcoholic liver disease was the leading chronic cause of alcohol-attributable deaths overall, most predominantly among men.

Excessive alcohol consumption at holiday parties and social events is included in what is termed binge drinking. Binge drinking was addressed in the CDC study.

Michigans alcohol epidemiologist, Patrick Hindman, drew attention to the rising prevalence of binge drinking, the report stated.

These new data are a reflection of drinking patterns, particularly binge drinking, as approximately 90 percent of adults who report excessive drinking, binge drink. According to a January 2020 CDC report, there were significant increases in total binge drinks per adult from 2011 to 2017 among adults who reported binge drinking for both men and women, and those aged 35-44 years (up 26.7 percent) and 45-64 years (up 23.1%).

EDITORS NOTE: Tomorrow, the Daily Mining Gazette will examine the impact of drinking parents on minor children.

Today's breaking news and more in your inbox

Here is the original post:

Excessive alcohol consumption is life-threatening, particularly during holidays - Daily Mining Gazette

Read More..

What Kind Of Investors Own Most Of BIT Mining Limited (NYSE:BTCM)? – Simply Wall St

Every investor in BIT Mining Limited (NYSE:BTCM) should be aware of the most powerful shareholder groups. Insiders often own a large chunk of younger, smaller, companies while huge companies tend to have institutions as shareholders. Warren Buffett said that he likes "a business with enduring competitive advantages that is run by able and owner-oriented people." So it's nice to see some insider ownership, because it may suggest that management is owner-oriented.

BIT Mining is a smaller company with a market capitalization of US$497m, so it may still be flying under the radar of many institutional investors. Our analysis of the ownership of the company, below, shows that institutions own shares in the company. Let's take a closer look to see what the different types of shareholders can tell us about BIT Mining.

Check out our latest analysis for BIT Mining

Many institutions measure their performance against an index that approximates the local market. So they usually pay more attention to companies that are included in major indices.

As you can see, institutional investors have a fair amount of stake in BIT Mining. This can indicate that the company has a certain degree of credibility in the investment community. However, it is best to be wary of relying on the supposed validation that comes with institutional investors. They too, get it wrong sometimes. When multiple institutions own a stock, there's always a risk that they are in a 'crowded trade'. When such a trade goes wrong, multiple parties may compete to sell stock fast. This risk is higher in a company without a history of growth. You can see BIT Mining's historic earnings and revenue below, but keep in mind there's always more to the story.

Hedge funds don't have many shares in BIT Mining. The company's largest shareholder is Tsinghua Holdings Corporation Limited, with ownership of 20%. Meanwhile, the second and third largest shareholders, hold 15% and 5.0%, of the shares outstanding, respectively. Man San Law, who is the second-largest shareholder, also happens to hold the title of Senior Key Executive.

After doing some more digging, we found that the top 13 have the combined ownership of 50% in the company, suggesting that no single shareholder has significant control over the company.

While studying institutional ownership for a company can add value to your research, it is also a good practice to research analyst recommendations to get a deeper understand of a stock's expected performance. We're not picking up on any analyst coverage of the stock at the moment, so the company is unlikely to be widely held.

The definition of company insiders can be subjective and does vary between jurisdictions. Our data reflects individual insiders, capturing board members at the very least. Company management run the business, but the CEO will answer to the board, even if he or she is a member of it.

Most consider insider ownership a positive because it can indicate the board is well aligned with other shareholders. However, on some occasions too much power is concentrated within this group.

Our most recent data indicates that insiders own a reasonable proportion of BIT Mining Limited. Insiders have a US$75m stake in this US$497m business. This may suggest that the founders still own a lot of shares. You can click here to see if they have been buying or selling.

The general public-- including retail investors -- own 48% stake in the company, and hence can't easily be ignored. While this size of ownership may not be enough to sway a policy decision in their favour, they can still make a collective impact on company policies.

We can see that Private Companies own 20%, of the shares on issue. It might be worth looking deeper into this. If related parties, such as insiders, have an interest in one of these private companies, that should be disclosed in the annual report. Private companies may also have a strategic interest in the company.

It's always worth thinking about the different groups who own shares in a company. But to understand BIT Mining better, we need to consider many other factors. To that end, you should learn about the 4 warning signs we've spotted with BIT Mining (including 3 which are potentially serious) .

If you would prefer check out another company -- one with potentially superior financials -- then do not miss this free list of interesting companies, backed by strong financial data.

NB: Figures in this article are calculated using data from the last twelve months, which refer to the 12-month period ending on the last date of the month the financial statement is dated. This may not be consistent with full year annual report figures.

Have feedback on this article? Concerned about the content? Get in touch with us directly. Alternatively, email editorial-team (at) simplywallst.com.

This article by Simply Wall St is general in nature. We provide commentary based on historical data and analyst forecasts only using an unbiased methodology and our articles are not intended to be financial advice. It does not constitute a recommendation to buy or sell any stock, and does not take account of your objectives, or your financial situation. We aim to bring you long-term focused analysis driven by fundamental data. Note that our analysis may not factor in the latest price-sensitive company announcements or qualitative material. Simply Wall St has no position in any stocks mentioned.

See original here:

What Kind Of Investors Own Most Of BIT Mining Limited (NYSE:BTCM)? - Simply Wall St

Read More..

Cognitive Security Market Size & Share, Future Growth, Trends Evaluation, Demands, Regional Analysis and Forecast to 2027, by report ocean Market…

Cognitive Security market report contains detailed information on factors influencing demand, growth, opportunities, challenges, and restraints. It provides detailed information about the structure and prospects for global and regional industries. In addition, the report includes data on research & development, new product launches, product responses from the global and local markets by leading players. The structured analysis offers a graphical representation and a diagrammatic breakdown of the Cognitive Security market by region.

Cognitive security market in IT & telecommunication is expected to reach $3.68 billion by 2023 growing at a CAGR of 30.36% during the forecast period.

Cognitive Security Market In IT & Telecommunication: Global Drivers Restraints Opportunities Trends and Forecasts up to 2023

Request To Download Sample of This Strategic Report:-https://reportocean.com/industry-verticals/sample-request?report_id=IR105

Overview:The Cognitive Security Market in It & Telecommunication is defined as security that uses data mining machine learning natural language processing (NLP) and human-computer interface for securing data from cyber-attacks and virus. In addition the cognitive system even helps in analyzing the security developments and discrete the structured and unstructured information data into relevant information. It also provides security to businesses and helps in improving the productivity of the business. The increasing shift toward the use of cognitive security services for data storage of confidential and private data of an organization and the rise in employee mobility contribute to the need for cognitive security in IT & telecommunication.

With the increasing adoption of the cloud-based services in various business platforms such as enterprize business has led to the need to secure the information of organizations. The implementation of cloud-based cognitive security by small and medium enterprises is increasing rapidly and fuels the growth of the market.

Market Analysis:According to Reportocean Research the cognitive security market in IT & telecommunication is expected to reach $3.68 billion by 2023 growing at a CAGR of 30.36% during the forecast period. Cognitive security is widely being adopted across diverse set of industries for the protection of crucial information that includes public safety and utility companies. An increase in the adoption of the cloud-based services and the Internet across the IT & telecommunication sector the need to protect the data has irapidly increased.Furthermore the Americas is experiencing significant growth due to the developed infrastructure in the region boosting the cognitive security market followed by APAC and EMEA during the forecast period.

Request To Download Sample of This Strategic Report:-https://reportocean.com/industry-verticals/sample-request?report_id=IR105

Market Segmentation Analysis:The report provides a wide-range evaluation of the market. It provides an in-depth qualitative insights historical data and supportable projections and assumptions about the market size. The projections featured in the report have been derived using proven research methodologies and assumptions based on the vendors portfolio blogs whitepapers and vendors presentations. Thus the research report serves every side of the market and is segmented based on regional markets deployment organization size and end-users.

Countries and Vertical Analysis:The report contains an in-depth analysis of the vendor profiles which includes financial health business units key business priorities SWOT strategy and views; and competitive landscape. The key and the prominent vendors covered in the report include Intel Security XTN Symantec Corporation IBM Corporation Cisco Systems CA Technologies Inc. CSC Fortinet Inc. Cato Networks and Check Point Software Technologies. Most of the major players are in the Americas. The vendors have been identified based on the portfolio geographical presence marketing & distribution channels revenue generation and significant investments in R&D.

The counties covered in report are Canada the US China India Japan and Germany. Among these Japan the US and China are expected to grow at a high rate during the forecast period (2017-2023) owing to an increase in the penetration rate of e-commere connected devices and increasing number of data centers.

Download Free Sample Report, SPECIAL OFFER (Avail an Up-to 30% discount on this report-https://reportocean.com/industry-verticals/sample-request?report_id=IR105

Competitive AnalysisThe report covers and analyzes the cognitive security market. Various strategies such as joint ventures partnerships collaborations and contracts have also been included accordingly. In addition as customers are in search for better solutions a rising number of partnerships is expected. There is likely to be an increase in the number of mergers acquistions and strategic partnership during the forecast period.

The report includes a complete insight of the industry and aims to provide an opportunity for the emerging and established players to understand the market trend current scenario initiative taken by government and the latest technology related to the market. In addition it also helps the venture capitalists in understanding the companies better and take informed decisions.

Regional AnalysisThe Americas is the dominating region which holds the largest share for of the cognitive security market owing to the high adoption of cloud security by small and medium size enterprises as the benefits and cost factors are advantageous. In addition they have the largest base for technological innovations and adoption and are primarily one of the global producers of automation equipment and is home to several domestic industries.

Asia Pacific is among the fastest growing markets for cognitive security. The region boasts of major developing economies with focus on the increasing data centers and the growing penetration rate of connected devices across this region. In addition the government is focused on ICT infrastructure development owing to the increasing demand for safety and security of information. EMEA is the third largest contributor to the cognitive security market due to the increasing demand from the IT industries. The companies are utilizing IoT analytics cloud and various tools to differentiate their services.

Ask for Discount https://reportocean.com/industry-verticals/sample-request?report_id=IR105

Cloud-based solution is the major driving factor in the region. The proliferation of connected devices such as smartphones tablets laptops and drones is driving the market in the region. The major telecommunication industries are also partnering with cognitive security vendors to secure their products and services. Thus the Cognitive Security Market in IT & Telecommunication is expected to witness significant growth in this region.

Benefits

The report provides an in-depth analysis of the cognitive security market aiming to secure the data and services reduce operational cost improve business efficiency and operational performance. With the help of cognitive security various organizations can increase the productivity and efficiency and can ensure the protection of the data. They can easily be integrated with other applications. They can be installed either on-premises or even through the network of the vendors. In addition the solutions are proven to be reliable and improves scalibility. The report discusses about the organization size deployment mode end-users and regions. Further the report provides details about the major challenges impacting the market growth.

Region/Country Cover in the Report

Regions-Canada the US China India Japan and Germany. Among these Japan the US and China

Access Full Report, here:-https://reportocean.com/industry-verticals/sample-request?report_id=IR105

Key Players Covered in the Report

Regions- Intel Security XTN Symantec Corporation IBM Corporation Cisco Systems CA Technologies Inc. CSC Fortinet Inc. Cato Networks and Check Point Software Technologies

This report covers aspects of the regional analysis market.The report includes data about North America, Europe, Asia Pacific, Latin America, the Middle East, and Africa.This report analyzes current and future market trends by region, providing information on product usage and consumption.Reports on the market include the growth rate of every region, based on their countries over the forecast period.

What factors are taken into consideration when assessing the key market players?

The report analyzes companies across the globe in detail.The report provides an overview of major vendors in the market, including key players.Reports include information about each manufacturer, such as profiles, revenue, product pricing, and other pertinent information about the manufactured products.This report includes a comparison of market competitors and a discussion of the standpoints of the major players.Market reports provide information regarding recent developments, mergers, and acquisitions involving key players.

Access Full Report, here:-https://reportocean.com/industry-verticals/sample-request?report_id=IR105

What are the key findings of the report?This report provides comprehensive information on factors expected to influence the market growth and market share in the future.The report offers the current state of the market and future prospects for various geographical regions.This report provides both qualitative and quantitative information about the competitive landscape of the market.Combined with Porters Five Forces analysis, it serves as SWOT analysis and competitive landscape analysis.It provides an in-depth analysis of the market, highlighting its growth rates and opportunities for growth.

About Report Ocean:We are the best market research reports provider in the industry. Report Ocean believes in providing quality reports to clients to meet the top line and bottom line goals which will boost your market share in todays competitive environment. Report Ocean is a one-stop solution for individuals, organizations, and industries that are looking for innovative market research reports.

Access Full Report, here:- https://reportocean.com/industry-verticals/sample-request?report_id=IR105

Get in Touch with Us:Report Ocean:Email: sales@reportocean.comAddress: 500 N Michigan Ave, Suite 600, Chicago, Illinois 60611 UNITED STATES Tel: +1 888 212 3539 (US TOLL FREE)Website: https://www.reportocean.com/

Visit link:

Cognitive Security Market Size & Share, Future Growth, Trends Evaluation, Demands, Regional Analysis and Forecast to 2027, by report ocean Market...

Read More..

Mobile Ticketing Market 2021 by Top region Data: Global Industry Trends, Share, Size, Demand, Growth Opportunities, Industry Revenue, Future and…

Mobile Ticketing Market to reach USD 4349.8 million by 2027. Mobile Ticketing Market valued approximately USD 705.4 million in 2016 is anticipated to grow with a healthy growth rate of more than 22.4% over the forecast period 2021-2027.

Mobile Ticketing Market report contains detailed information on factors influencing demand, growth, opportunities, challenges, and restraints. It provides detailed information about the structure and prospects for global and regional industries. In addition, the report includes data on research & development, new product launches, product responses from the global and local markets by leading players. The structured analysis offers a graphical representation and a diagrammatic breakdown of the Mobile Ticketing Market by region.

Request To Download Sample of This Strategic Report@:-https://reportocean.com/industry-verticals/sample-request?report_id=16422

This report analyzes the global primary production, consumption, and fastest-growing countries in the Information and Communications Technology(ICT) market. Also included in the report are prominent and prominent players in the global Information and Communications Technology Market (ICT).

According to Statista, as of 2021 data, the United States held over ~36% of the global market share for information and communication technology (ICT). With a market share of 16%, the EU ranked second, followed by 12%, China ranked third. In addition, according to forecasts, the ICT market will reach more than US$ 6 trillion in 2021 and almost US$ 7 trillion by 2023. In todays society, continuous growth is another reminder of how ubiquitous and crucial technology has become. Over the next few years, traditional tech spending will be driven mainly by big data and analytics, mobile, social, and cloud computing.

An increasing number of customers have shifted from feature phones to smartphones. Which as a result, showed customers are well acquainted with the functioning of a smartphone. On the other hand, mobile ticketing applications can be easily installed and operated in smartphones. Due to which, wide adoption of smartphones increased rapidly affecting the growth of the global mobile ticketing market, and this trend is estimated to continue over the forecast period.

Download Free Sample Report,SPECIAL OFFER (Avail an Up-to 30% discount on this report@:-https://reportocean.com/industry-verticals/sample-request?report_id=16422

The objective of the study is to define market sizes of different segments & countries in recent years and to forecast the values to the coming eight years. The report is designed to incorporate both qualitative and quantitative aspects of the industry within each of the regions and countries involved in the study. Furthermore, the report also caters the detailed information about the crucial aspects such as driving factors & challenges which will define the future growth of the market. Additionally, the report shall also incorporate available opportunities in micro markets for stakeholders to invest along with the detailed analysis of competitive landscape and product offerings of key players.

The detailed segments and sub-segment of the market are explained below:

> By Type> Mobile Ticketing Application> SMS Mobile Ticketing> By Application> Travel Ticketso Airline Ticketso Railway Ticketso Bus TicketsBy Regions:> North America> U.S.> Canada> Europe> UK> Germany> Asia Pacific> China> India> Japan> Rest of the World

Furthermore, years considered for the study are as follows:Historical year 2015Base year 2016Forecast period 2017 to 2025

Some of the key manufacturers involved in the market are Bytemark, Corethree, Eventbrite, Gemalto, Masabi, ShowClix, Bizzabo, eos. uptrade, Margento, Open Mobile Ticketing Alliance, StubHub, Tick Pick Acquisitions and effective mergers are some of the strategies adopted by the key manufacturers. New product launches and continuous technological innovations are the key strategies adopted by the major players.

Get a Sample PDF copy of the report@:-https://reportocean.com/industry-verticals/sample-request?report_id=16422

Target Audience of the Global Mobile Ticketing in Market Study:> Key Consulting Companies & Advisors> Large, medium-sized, and small enterprises> Venture capitalists> Value-Added Resellers (VARs)> Third-party knowledge providers> Investment bankers

TABLE OF CONTENTSChapter 1. Global Mobile Ticketing Market Definition and Scope1.1. Research Objective1.2. Market Definition1.3. Scope of The Study1.4. Years Considered for The Study1.5. Currency Conversion Rates1.6. Report LimitationChapter 2. Research Methodology2.1. Research Process2.1.1. Data Mining2.1.2. Analysis2.1.3. Market Estimation2.1.4. Validation2.1.5. Publishing2.2. Research AssumptionChapter 3. Executive Summary3.1. Global & Segmental Market Estimates & Forecasts, 2015-2025 (USD Billion)3.2. Key TrendsChapter 4. Global Mobile Ticketing Market Dynamics4.1. Growth Prospects4.1.1. Drivers4.1.2. Restraints4.1.3. Opportunities4.2. Industry Analysis4.2.1. Porters 5 Force Model4.2.2. PEST Analysis4.2.3. Value Chain Analysis4.3. Analyst Recommendation & Conclusion

Chapter 5. Global Mobile Ticketing Market, By Type5.1. Market Snapshot5.2. Market Performance Potential Model5.3. Global Mobile Ticketing Market, Sub Segment Analysis5.3.1. Mobile Ticketing Application5.3.1.1. Market estimates & forecasts, 2015-2025 (USD Billion)5.3.1.2. Regional breakdown estimates & forecasts, 2015-2025 (USD Billion)5.3.2. SMS Mobile Ticketing5.3.2.1. Market estimates & forecasts, 2015-2025 (USD Billion)5.3.2.2. Regional breakdown estimates & forecasts, 2015-2025 (USD Billion)Chapter 6. Global Mobile Ticketing Market, By Application7.1. Market Snapshot7.2. Market Performance Potential Model7.3. Global Mobile Ticketing Market, Sub Segment Analysis

Request Full Report@:-https://reportocean.com/industry-verticals/sample-request?report_id=16422

Final Report will add the analysis of the impact of COVID-19 on this industry.

a large number of indigenous manufacturers of syringes and needles have managed to come up. However, it does not mean that imports are low for this market. Imports, as in the case with other medical devices, are quite high but the domestic manufacturers have been able to tap foreign markets through increasing exports. The target base of consumers is growing steadily which is expected to significantly boost sales in the market.

It begins with the introduction section which mentions the features and uses of syringes and needles along with a brief description of the various phases in their development. The market overview section provides an insight into the market and highlights the market size. Import and export figures for syringes and needles, both in terms of volume and value have been provided in the next section. It also includes the regional break-up of the imports and exports.

An analysis of the drivers explains the factors leading to the growth of the market which include increasing need of insulin doses, increasing demand for vaccines, improving health infrastructure, growing incidence of diseases, changing demographics and health check-up packages. Some of the major challenges to the market are illegal recycling of syringes and needles and problems associated with usage. Government legislation in the market has been discussed in the next section.The competition section highlights the features of the major players operating in the market. A brief profile of the major domestic and foreign players in the market along with their financials has been included in this section.

A section providing strategic recommendations has been given at the end of the report which gives effective solutions to existing and potential players for improving market share and increasing profitability. The Market report answers the following questions:

Access Full Report, here:-https://reportocean.com/industry-verticals/sample-request?report_id=16422

What is the aim of the report?

Based on various indicators, the Year-on-Year growth (%) and compound annual growth rate (CAGR) for the given forecast period is offered.An overview of the Market based on geographical scope, market segmentation and financial performance of key players is presented in the report.The report presents current trends in the industry and future scope of the Market in North America, Asia Pacific, Europe, Latin America and Middle East and Africa.The various parameters accelerating the growth of Market are incorporated in the research report.The report analyses growth rate, market size and valuation of the Market during the forecast period.

What aspects regarding the regional analysis Market are included in this report?

Geographical regions covered in the report include North America, Europe, Asia Pacific, Latin America and Middle East and Africa region.The report consists of detailed region-wise analysis of current and future market trends, providing information on product usage and consumption.The growth rate of the market in every region, including their countries over the forecast period is included in the market report.Based on what factors are the key market players assessed in this report?The report offers detailed analysis of leading companies in the market across the globe.It provides details of the major vendors involved in the Market including Key PlayersA comprehensive overview of each company including the company profile, generated revenue, pricing of goods andthe manufactured products is incorporated in the report.The facts and figures about market competitors along with standpoints of leading market players are presented in the report.The recent developments, mergers and acquisitions related to mentioned key players are provided in the market report.

Access full Report Description, TOC, Table of Figure, Chart, etc:-https://reportocean.com/industry-verticals/sample-request?report_id=16422

What is the key information extracted from the report?

Extensive information on factors estimated to affect the Market growth and market share during the forecast period is presented in the report.The report offers the present scenario and future growth prospects Market in various geographical regions.The competitive landscape analysis on the market as well as the qualitative and quantitative information is delivered.The SWOT analysis is conducted along with Porters Five Force analysis.The in-depth analysis provides an insight into the Market, underlining the growth rate and opportunities offered in the business.

About Report Ocean:

We are the best market research reports provider in the industry. Report Ocean believes in providing quality reports to clients to meet the top line and bottom line goals which will boost your market share in todays competitive environment. Report Ocean is a one-stop solution for individuals, organizations, and industries that are looking for innovative market research reports.

Get in Touch with Us:

Report Ocean:

Email: sales@reportocean.com

Address: 500 N Michigan Ave, Suite 600, Chicago, Illinois 60611 UNITED STATES

Tel: +1 888 212 3539 (US TOLL FREE)

Website: https://www.reportocean.com

Read the original post:

Mobile Ticketing Market 2021 by Top region Data: Global Industry Trends, Share, Size, Demand, Growth Opportunities, Industry Revenue, Future and...

Read More..

The Cult of Statistical Significanceand the Neglect of Oomph – Walter Bradley Center for Natural and Artificial Intelligence

A central part of John Maynard Keynes explanation of the Great Depression was his assertion that household income affects household spending. When people lose their jobs and income, they cut back on their spending, which causes other people to lose their jobs and their income propelling the economy downhill.

Keynes theory was based on logic and common sense. It was later tested empirically with household survey data and with national income data compiled by the National Bureau of Economic Research.Figure 1shows U.S. after-tax personal income and consumer spending for the years 1929 through 1940. Since income and spending both tend to grow over time along with the population, the data were converted to annual percentage changes.

The observed statistical relationship is highly statistically significant. If there were no relationship between income and spending, the chances of a correlation as high as that shown in Figure 1 would be0.000000002.

It is not all about statistical significance, however. Keynes argument hinges on changes in income having a substantial effect on spending. The slope of the line in Figure 1 is 0.83, which supports Keynes argument about the importance of the linkage between income and spending. Specifically, a 1 percent increase (or decrease) in income is predicted to increase (or decrease) spending by 0.83 percent.

Suppose, however, that the data were those shown in Figure 2. The relationship is statistically significant, but the slope is only 0.01. When income goes up or down by 1 percent, spending is predicted to increase or decrease by a negligible one-hundredth of a percent, which would undercut Keynesargument completely.

Empirical studies should report both statistical persuasiveness and whether the estimated coefficients are substantial and plausible. It is not plausible that anincrease in income would reduce spending or that it would increase spending by more than the increase in income. Thus, a statistically significant relationship between income and spending with a slope of 1.2 or +3.4 would be a reason for distress, not celebration. Instead of rushing off to publish counter-intuitive findings, we should investigate the reasons for the implausible results.

Figure 3 is another example a fourth order polynomial that gives a good fit with every coefficient statistically significant. Yet, the model has clearly gone off the tracks predicting that spending increases when there is a 12 percent drop in income and that spending falls when there is a 6 percent increase in income. When the data can be plotted in a simple scatter diagram, like Figure 3, it is obvious that, despite the statistically significant coefficients, the results are useless. However, these flaws are more difficult to detect in models with multiple explanatory variables. What is certain is that the success of a model cannot be assessed solely by looking at the statistical significance of the coefficients.

Economists have been criticizedsharply and repeatedly by Deirdre McCloskey forconfusing statistical significance with practical importance (what she calls oomph).A widespread focus on statistical significance rather than practical importance has also been found in dozens of papers published in the fields of psychology, education, and epidemiology.

Ananya Sen, Claire Van Note, and I analyzed 306 empirical papers that werepublished duringthe years 2010-2019inMIS Quarterly,generally considered to be one of the top information systems journals, to see whether these papers were fixated on statistical significance at the expense of practical importance. They were.

We found that78 percent of the papers used statistical significance alone to judge the success of their models. Many focused on counting the number ofstatisticallysignificantresults, with little concern for practical importance; for example, these authors reported statistical significance for nine of their ten hypotheses:

Table 5 summarizes the converged results of the model. As we can see, the fixed effects of apps, off-hour accesses, conf, off-site accesses, and log(DeptSize) all significantly support H1, H2, H3, H4, and H5(a). The cross-level interaction terms are significant, except Apps*Log(DeptSize), therefore supporting H6(c), H6(d) H6(e), and H6(f), but not H6(b).

Wheres an assessment of the oomph? Nowhere to be seen.

Another study investigated the factors affecting German household decisions to adopt smart metering technology (SMT) for monitoring electricity consumption. One factor they considered was household income:Consumers with higher income are able to spend on environmental friendly devices such as SMT and are more likely to adopt it, but the researchers do not say how much more likely they do not consider the practical importance of their findings. Nor did their paper give enough information for readers to judge for themselves.

The authors write that,Intention is the subjective probability that a person will perform a certain behavior; however, I contacted the authors and learned that their intention variable is not a probability but, instead, the average value of each households response to three questions on a Likert scale of 17. Similarly, the income explanatory variable is defined asthe average income of the consumers, but we are not told whether it is weekly, monthly, or annual income and whether the data are recorded in euros, thousands of euros, or some other unit. It turns out that the data are monthly income measured in thousands of euros. All this detective work yields our oomph answer: a 1000-euro increase in monthly household income is predicted to increase a households intention to adopt SMT on a 17 Likert scale by a trifling 0.062.

There are two related problems with a myopic focus on statistical significance. First, it encourages data mining and data torturing in a quest for statistically significant results. Second, models that are judgedby statistical significance rather than the plausibility of the coefficients are apt to fare poorly with fresh data.

This misplaced focus on statistical significance is aninherent weakness of deep neural networks and other black box models, since computer algorithms do not understand the world in any relevant sense and consequently cannot assess oomph or plausibility. Black box algorithms would happily choose the useless fourth-order polynomial in Figure 3.

Sound reliable empirical analyses are enhanced by de-emphasizing statistical significance and focusing, instead, on expert assessments of a models credibility and oomph.

More here:

The Cult of Statistical Significanceand the Neglect of Oomph - Walter Bradley Center for Natural and Artificial Intelligence

Read More..

SensOre releases technology and exploration update ahead of the new year – Proactive Investors UK

Currently, the minerals targeting company is looking to attract direct investment for its portfolio of lithium and nickel targets.

SensOre Ltd has provided a technology and exploration update ahead of the new year.

Currently, the minerals targeting company, which intends to list on the ASX next quarter, is looking to attract direct investment for its portfolio of lithium and nickel targets.

In other news, the company is on the hunt for new gold targets in WA with a series of exploration partners.

Looking at the big picture, SensOre has also passed the 20,000-metre drilling milestone on its wholly-owned and joint venture projects.

SensOres data mining for lithium prospectivity in WA has opened up new pegmatite opportunities.

To date, promising results from SensOres first lithium prospectivity runs have attracted international interest in funding expanded regional search opportunities.

SensOre chief operating officer Robbie Rowe said: These first predicted lithium targets are now possible due to SensOres continued investment in a massive geochemical data cleaning program combined with geology transformation and WA state-wide geophysical compilation programs.

SensOres Discriminant Predictive Targeting (DPT) technology for nickel has generated previously unidentified nickel potential on open ground.

Fast on the heels of delivering the Yilgarn nickel targets to BHP, the company has honed in on new opportunities in the Albany-Fraser and other parts of WA.

Combined with the Auralia Project in which SensOre holdsina 70% joint venture with a Chalice Mining Ltd (ASX:CHN, OTCQB:CGMLF) subsidiary these new, top-ranking nickel target applications on open tenure extend the known nickel search space in WA.

The company is now analysing high-ranking nickel targets on third-party tenure that could form acquisition targets in early 2022. Initial applications are now in place, with more to follow.

SensOre has also commenced partnering discussions to fund exploration on its 100%-owned targets.

In the meantime, SensOre and DGO Gold Ltd (ASX:DGO) have expanded their gold exploration activities.

This includes adding new targets to the Yilgarn Exploration Ventures joint venture and jointly approaching third parties to acquire new acreage in the WA Goldfields.

The next stage of the joint venture builds on the exploration activities conducted in the last two years over multiple projects.

SensOres collaboration with Great Boulder Resources Ltd (ASX:GBR) has opened up potential on eastern portions of the Tea Well Project, trending south from Mulga Bill.

SensOres subsidiary, Yilgarn Exploration Ventures, completed an extension of a gravity geophysical survey over the Tea Well project in collaboration with GBR.

The survey has extended coverage of the eastern flank of the Polelle syncline sequence east of the Meekatharra mining camp and south of the Mulga Bill prospect.

Promisingly, results have identified a series of previously untested gravity low features on the Tea Well Project tenure under shallow transported cover, indicating lower density lithologies within the basement mafic volcanic north-south trending sequence.

SensOre is also advancing discussions with several top-tier Australian technology companies about developing a proprietary Data Cube platform to service current and future mining sector clients.

Finally, SensOre has exercised its option in relation to the Moonera prospect.

Following infill geophysical programs in mid-2021, drilling is now planned in early 2022 to test a large, 7-kilometre geophysical feature, which is interpreted as a carbonatite-intrusive centre prospective for rare earth elements and copper.

Phase one drilling at Moonera is eligible for co-funding under the WA Government EIS program after a successful application was awarded in 2021.

See the article here:

SensOre releases technology and exploration update ahead of the new year - Proactive Investors UK

Read More..

Top 10 online courses on Coursera and how they help you upskill – Telegraph India

Summary

Online upskilling platforms like Coursera are bridging the massive skills gap between professionals and industries

Most in-demand courses on Coursera are on Data Science, Machine Learning, Web Development, Finance, Mental Wellbeing

Emerging technologies and dynamic changes have rendered a large number of Indian professionals unsuitable for the evolving job market. You can avoid this massive upskilling gap by being part of the recent digital revolution in the education sector where online platforms aim to get students and professionals job-ready.

A major player in the online education space, Coursera brings courses offered by top global universities and leading technology companies under one umbrella and offers them to young professionals.

Here are the most in-demand courses on Coursera:

This popular course will give you a general overview of Machine Learning, Data Mining and Statistical Pattern Recognition in just 11 weeks. Drawing from numerous case studies and applications, itll teach you how to apply algorithms to the development of smart robots, text understanding, computer vision, medical informatics, and audio and database mining. Here youll also learn theory as well as practical know-how, enabling you to apply Machine Learning techniques to resolve new problems.

Click here to learn more.

The target of this course is to teach everyone the fundamentals of Computer Programming using Python. You'll go over the fundamentals of building a programme from a set of simple instructions. There are no prerequisites for this course, which avoids all but the most basic mathematics. Anyone with a basic understanding of computers should be able to understand the material in this course. Once you complete this curse, youll be ready to deal with more advanced courses.

Click here to learn more.

This course will teach you the skills required to apply for entry-level data analyst jobs. Here youll get introduced to the world of Data Analytics through a hands-on curriculum created by Google. Other than learning key topics in this field, youll get an overview of whats to come in the Google Data Analytics Certificate. Youll be aided by Google data analysts and the best tools and resources.,

Click here to learn more.

Designed for non-native English speakers, this course is for anyone who wants to advance their careers in the global marketplace. Here youll learn job search, application and interviews. Other than offering the opportunity to explore your career options, youll also be able to expand your vocabulary and improve your language skills in order to achieve your professional goals.

Click here to learn more.

Here youll get an overview of current practices and analysis of the financial markets. Emphasising finance-based leadership roles, this course will also teach you future prospects of risk management and behavioural finance principles. It is designed to help students and young professionals understand how the securities, insurance and banking industries work in the real world.

Click here to learn more.

In this four-week-long course, you will learn the fundamental tools that every web page coder should be familiar with. It starts from the ground up, teaching how to use HTML and CSS to create modern web pages. Then you will learn the more complex industry-level aspects of web designing.

Click here to learn more.

This four-week long course will give you easy access to the invaluable learning techniques used by experts in a wide range of fields like art, music, literature, maths, science and sports. You'll also get to know about illusions, memory techniques, dealing with procrastination and best practices. Here youll get introduced to recent research and learn how to master difficult subjects.

Click here to learn more.

In this course, youll complete a series of challenges aimed at increasing your happiness and developing more productive habits. The four-week-long course reveals misconceptions about happiness, annoying features of the mind and research that can help us change as preparation for these tasks. After completion of this course, youll learn to incorporate specific wellness activities in your life.

Click here to learn more.

Mental-health awareness has emerged as one of the most alarming aspects of the 21st century. In this course, youll learn about perception, communication, learning, memory, decision-making, persuasion, emotions and social behaviour. Through this course, youll get to know how these aspects of the mind differ among people, how they are wired up in our brain and how they break down as a result of illness or injury.

Click here to learn more.

Googles foundation course on UX design focuses on how people interact with products such as websites, mobile apps and physical objects. Everyday interactions are made usable, enjoyable, and accessible by UX designers. By the end of this course, youll have a professional UX portfolio including three end-to-end projects.

Click here to learn more.

Last updated on 21 Dec 2021

The rest is here:

Top 10 online courses on Coursera and how they help you upskill - Telegraph India

Read More..

The relationship between objective app engagement and medication adherence in asthma and COPD: a retrospective analysis | Scientific Reports -…

Recruitment and eligibility

Data used in this retrospective analysis was collected from participants who enrolled in a digital self-management platform (Propeller Health, WI, USA) between January 2018 and March 2019. Participants who enrolled in the platform were recruited via social media campaigns (e.g., Facebook advertisements), and needed to own a smartphone and have a self-reported history of asthma and/or COPD to be eligible. All participants agreed to the platforms Terms of Service.

Data was examined retrospectively using an aggregated dataset. To be included in the analysis, participants needed to be18years of age, reside in the United States, and have a controller inhaler compatible with an electronic medication monitor (EMM). Participants also needed to have at least 97days of controller medication use data (the first seven days of participation was considered an onboarding period). The retrospective analysis plan was determined to be exempt and consent was waived by the Copernicus Independent Review Board (PRH1-18-132). A subset of data used in this retrospective analysis included data previously collected from an electronic survey to which patients provided consent (Protocol 20191728). All methods were carried out in accordance with relevant guidelines and regulations.

Propeller Health is an FDA-cleared digital platform that includes an EMM, and a paired smartphone app targeted to the users self-reported condition (asthma or COPD) (Fig.1).

A small FDA-cleared electronic medication monitor (EMM) is attached to the users controller medication inhaler to capture the date and time of use. Data from the EMM is then transferred wirelessly via Bluetooth to a paired smartphone app providing feedback, insights and medication reminders.

Electronic medication monitors (EMMs) attach to a compatible inhaler medication to passively capture the date and time of use. Usage data is then wirelessly transferred via Bluetooth to a paired smartphone app. The EMM has a battery life of 1218months and does not require charging11. Compatible medications include inhaled corticosteroids (ICS), long-acting beta-agonists (LABA), long-acting muscarinic antagonists (LAMA), and combination therapies (ICS+LABA, LABA/LAMAs and triple therapy).

The paired smartphone app serves not only to collect data from the EMM, but also to engage the user through evidence-based asthma and/or COPD content, including relevant guideline content20,21, feedback on medication use and trends, and schedule-based medication reminders through the EMM and smartphone application. Patients with continued poor medication adherence may be presented with additional gamified features and challenges aimed at improving daily medication adherence. The app also prompts users to complete an in-app Asthma Control Test (ACT) or COPD Assessment Test (CAT) at baseline and monthly thereafter to better assess disease control and burden, respectively (Supplementary Fig.1a,b).

We examined app engagement, defined by daily app opens and app active session duration, as the independent variable. Daily app engagement was defined differently for each model estimate to explore the varying associations of duration on controller medication adherence: Model 1 (no app open vs. any app open regardless of session duration) and Model 2 (no app open vs. at least one app open with<1, 1<5, 510 and 10+minutes of total daily app session duration).

Controller inhaler use was determined using data collected from the EMM, which recorded the date and time of each inhaler actuation. Adherence was calculated by dividing the number of EMM-recorded actuations by the prescribed number of actuations (reported by the participant during enrollment)100 per day.

For the primary analyses, the outcome of controller medication use was dichotomously defined as having taken at least 1 actuation vs. no actuation per day.Controller adherencewas dichotomized because daily adherence was either 0% or 100% on the majority of participant-days (74%). For secondary analyses, controller medication use was defined as being 100% adherent vs.<100% per day. Being 100% adherent was defined as having EMM-recorded controller actuations that were greater than or equal to the total number of prescribed actuations for that day.

Symptom control was assessed with the Asthma Control Test (ACT), a self-administered, validated questionnaire for patients with asthma. The 5-item assessment asks respondents to rate their symptoms on a scale of 15. A score>19 indicates good symptom control, 1519 indicates not well-controlled symptoms, and<15 indicates very poorly controlled symptoms22.

Disease burden for participants with COPD was assessed with the COPD Assessment Test (CAT). The 8-item self-administered questionnaire asks respondents to rate their symptoms on a scale of 15. Summative scores<20 indicate lower disease burden, and scores20 indicate higher disease burden23.

Longitudinal, mixed-effects logistic regressions were used to estimate the association between daily app engagement and daily controller medication adherence during days 897 of EMM use for asthma and COPD, adjusting for age, gender, smartphone type (iOS vs. Android), baseline disease status (defined as initial ACT or CAT score), rescue medication use, day on platform and US Census-derived neighborhood-level income and education. Analyses were also stratified by age and disease severity. Stratification by age was completed for participants 40years and older to allow for comparisons between asthma and COPD. Odds ratios and 95% confidence intervals (CI) were presented, with alpha=0.05 as the significance threshold.

Representatives from the study sponsors (Propeller Health, Council of State and Territorial Epidemiologists) were involved in the study design, collection, analysis and interpretation of data, writing of the report, and in the decision to submit the paper for publication. The corresponding author had full access to all the data in the study and had final responsibility for the decision to submit for publication.

Continue reading here:

The relationship between objective app engagement and medication adherence in asthma and COPD: a retrospective analysis | Scientific Reports -...

Read More..