Category: Internet

  • MIL-OSI: MEXC Ventures Champions India Blockchain Tour 2025, Ignites Web3 Innovation Across 8 Cities

    Source: GlobeNewswire (MIL-OSI)

    VICTORIA, Seychelles, July 03, 2025 (GLOBE NEWSWIRE) — MEXC Ventures, the investment arm of the global cryptocurrency exchange MEXC, as the title sponsor of the 4th edition India Blockchain Tour (IBT) 2025, has partnered with organizer Octaloop (one of India’s earliest and most active crypto-native communities) to launch a six-month Web3 innovation roadshow spanning eight cities. The tour’s inaugural event took place successfully on June 28 in Hyderabad, drawing over 1,000 developers, founders, investors, and policy experts to engage in discussions focused on real-world applications of blockchain technology in governance, AI, and inclusive finance.

    As a key supporter of this tour, MEXC Ventures is committed to collaborating with industry stakeholders to accelerate the growth of India’s Web3 ecosystem.

    At the Hyderabad stop, Jayesh Ranjan, Special Chief Secretary of Telangana, attended the event and shared the government’s open attitude and policy direction toward blockchain technology, citing its applications in agriculture traceability and vehicle registration. He noted that platforms like IBT create valuable opportunities for collaboration between public systems and emerging technologies, further highlighting the importance that Indian local governments place on decentralized technologies.

    IBT 2025 is not just an eight-city tour, but a platform dedicated to building deep connections between India’s local Web3 innovators and the global Web3 community, fostering substantive exchanges and long-term collaboration. MEXC Ventures will leverage its global investment and project incubation expertise at each stop to empower high-potential teams to accelerate their growth.

    Octaloop Founder Anupam Varshney emphasized that India is poised to lead Web3 innovation on the global stage. He stated:

    “India doesn’t need to catch up – it’s ready to lead.IBT 2025 will amplify India’s Web3 voice, connect global projects with local innovators, and showcase our rapidly growing ecosystem to the world.”

    MEXC Ventures expressed strong confidence in India’s Web3 ecosystem. Petra Zhu, Head of South Asia Markets, stated:

    “We’re proud to kick off IBT 2025 in Hyderabad with MEXC Ventures as the title sponsor. India stands at the forefront of South Asia’s Web3 momentum, and MEXC Ventures is fully committed to supporting its long-term development.”

    She added:

    “We are actively looking to identify and empower the next generation of standout projects from India—visionary teams building real impact. We believe this region has the potential to shape the next wave of global crypto innovation, and MEXC Ventures is here to help turn that potential into reality.”

    The tour will next cover seven additional major innovation hubs across India, including Ahmedabad (July 26), Kolkata (August 16), and more. For the full schedule and participation details, please visit here.

    About Octaloop
    Founded in 2020, Octaloop began as grassroots crypto meet-ups in Delhi cafés in 2026 and has grown into India’s leading Web3 events and community-building platform. With initiatives like the India Blockchain Tour and Metamorphosis, Octaloop bridges global blockchain innovation with India’s home-grown talent.

    About MEXC Ventures
    MEXC Ventures is a comprehensive fund under MEXC dedicated to driving innovation in the cryptocurrency sector through investments in L1/L2 ecosystems, strategic investments, M&A and incubation. Upholding the principle of “Empowering Growth Through Synergy,” MEXC Ventures is committed to supporting innovative ideas and active builders in crypto. MEXC Ventures is an investor and supporter of TON and Aptos, looking forward to staying at the forefront of TON and Aptos’ innovations and actively engaging with builders to drive ecosystem growth.

    For more information, visit: MEXC Ventures Website

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/6a190510-7a13-429e-80b7-6ac21c1153ab

    CONTACT: For media inquiries, please contact MEXC PR team: media@mexc.com

    The MIL Network

  • MIL-OSI: MEXC Amplifies Bitcoin Reserves by 10% While Maintaining 100%+ Coverage Across All Assets

    Source: GlobeNewswire (MIL-OSI)

    VICTORIA, Seychelles, July 03, 2025 (GLOBE NEWSWIRE) — MEXC, a leading global cryptocurrency exchange, continues to demonstrate exceptional financial strength with its latest bi-monthly Proof of Reserve (POR) audit showing sustained growth and improved reserve coverage across all major cryptocurrencies. The June 2025 report reveals enhanced security ratios and continued expansion of the platform’s asset holdings, reinforcing MEXC’s position as a trusted and financially robust trading platform.

    Strengthened Reserve Coverage Across All Major Assets

    The latest audit confirms that MEXC maintains comprehensive over-collateralization across all major cryptocurrencies, with notable improvements in reserve ratios compared to the April 2025 report:

    MEXC Reserve Ratio Comparison (June 2025 vs April 2025)

    The most significant enhancement comes from Bitcoin reserves, which increased by over 10 percentage points to 127.59%, representing the highest reserve ratio among all tracked assets and demonstrating MEXC’s strengthened position in the leading cryptocurrency.

    Current Published Wallet Assets (June 2025)

    Major Cryptocurrency Holdings:

    • BTC: 4,083.89 Bitcoin
    • ETH: 69,234.39 Ethereum
    • USDT: 2,320,959,680.22 Tether
    • USDC: 72,357,584.50 USD Coin

    These holdings represent substantial reserves that exceed 100% coverage across all major cryptocurrencies, ensuring complete backing of user deposits with additional security buffers.

    Strategic Portfolio Optimization and Enhanced Stablecoin Liquidity

    The period from April to June 2025 demonstrates MEXC’s strategic approach to portfolio optimization and risk management. While maintaining robust Bitcoin reserve coverage at 127.59%, the platform has significantly strengthened its stablecoin position:

    Stablecoin Reserve Enhancement:

    • USDT Holdings: Increased from 2,242,291,463.26 to 2,320,959,680.22 (+78,668,216.96 USDT)
    • USDC Holdings: Grew from 72,265,212.89 to 72,357,584.50 (+92,371.61 USDC)
    • Combined Stablecoin Growth: $78.8 million in additional stablecoin reserves

    This strategic rebalancing toward increased stablecoin holdings provides enhanced liquidity and stability for user operations, ensuring MEXC can meet withdrawal demands efficiently even during periods of market volatility.

    Maintaining Industry-Leading Transparency Standards

    MEXC’s bi-monthly Proof of Reserve audits continue to set industry standards for transparency and accountability. The consistent publication of these comprehensive reports allows users to independently verify asset backing through publicly available blockchain data, ensuring complete transparency in the platform’s financial operations.

    Key Transparency Features:

    • Bi-monthly audits ensuring regular verification of reserves
    • Public blockchain verification allowing independent confirmation of holdings
    • Complete asset coverage with reserves exceeding 100% across all major cryptocurrencies
    • Real-time accessibility of reserve data for user verification

    Comprehensive Security Architecture Protecting User Assets

    MEXC’s multi-layered security framework continues to evolve, providing robust protection for user funds:
    Enhanced Security Measures:

    1. Over-Collateralization: All major assets maintain reserves exceeding 100%, with Bitcoin leading at 127.59%
    2. Insurance Fund Protection: Additional safeguards against extreme market volatility
    3. Regular Third-Party Audits: Bi-monthly verification ensuring continued compliance and accuracy
    4. Advanced Cold Storage: Majority of user funds secured in offline wallets with institutional-grade protection
    5. Real-Time Monitoring: Continuous surveillance of reserve levels and security protocols

    Platform Growth and User-Centric Innovation

    Beyond financial security, MEXC continues to enhance its platform offerings that have attracted over 40 million users worldwide:
    MMost Trending Tokens: Over 3,000 listed tokens providing diverse investment opportunities
    EEveryday Airdrops: Simplified participation in daily airdrop events with substantial rewards
    XXtremely Low Fees: Competitive trading fees maximizing user returns
    CComprehensive Liquidity: Deep market liquidity ensuring efficient trade execution

    These features, combined with MEXC’s proven financial stability, continue to position the platform as the preferred choice for traders seeking both security and opportunity in the cryptocurrency market. As the cryptocurrency market continues to evolve, MEXC remains dedicated to maintaining the highest standards of financial transparency and security. The consistent over-collateralization demonstrated in this latest report reinforces the platform’s commitment to user protection and sets the foundation for continued growth.

    About MEXC

    Founded in 2018, MEXC is committed to being “Your Easiest Way to Crypto”. Serving over 40 million users across 170+ countries, MEXC is known for its broad selection of trending tokens, frequent airdrop opportunities, and low trading fees. Our user-friendly platform is designed to support both new traders and experienced investors, offering secure and efficient access to digital assets. MEXC prioritizes simplicity and innovation, making crypto trading more accessible and rewarding.
    MEXC Official Website X TelegramHow to Sign Up on MEXC

    Risk Disclaimer:
    The information provided in this article about cryptocurrencies does not represent MEXC’s official stance or investment advice. Given the highly volatile nature of the cryptocurrency market, investors are encouraged to carefully evaluate market fluctuations, project fundamentals, and potential financial risks before making any trading decisions.

    Photos accompanying this announcement are available at :

    https://www.globenewswire.com/NewsRoom/AttachmentNg/f97f5695-3ca4-4c7d-bafe-f8c34d5f18de

    https://www.globenewswire.com/NewsRoom/AttachmentNg/4632bd46-221c-4220-91e0-9731d8bbceb2

    CONTACT: For media inquiries, please contact MEXC Media Centre media@mexc.com

    The MIL Network

  • MIL-OSI: BTC Miner: Stable High Returns in Cryptocurrency Cloud Mining, Earn Millions with Eas

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, July 03, 2025 (GLOBE NEWSWIRE) — In the ever-evolving cryptocurrency market, many investors are seeking stable and reliable investment opportunities. However, with the market’s volatility, traditional cryptocurrency investments often come with high risks. Enter BTC Miner, the cloud mining platform that offers a low-risk, high-return solution for global investors.

    BTC Miner utilizes advanced smart cloud mining technology to help users earn daily, stable returns without the need for technical knowledge or costly hardware. The platform’s unique feature is its guaranteed principal and fixed returns, ensuring that investors’ capital remains secure while generating consistent profits.

    Stable High Returns, Easy Profits

    As one of the leaders in the cryptocurrency industry, BTC Miner combines its smart cloud mining system and green energy mining farms to provide investors with a low-risk, sustainable investment platform. With BTC Miner, investors can easily choose different mining contracts and enjoy daily stable returns. For example:

    • Invest $200 and earn $10 daily, recouping $220 in 2 days
    • Invest $1,000 and earn $23.8 daily, recouping $1,071.40 in 3 days
    • Invest $30,000 and earn $502.5 daily, recouping $35,175 in 7 days

    These fixed-return contracts offer unprecedented stability, shielding investors from the risks associated with the fluctuating prices of Bitcoin, Ethereum, and other cryptocurrencies.

    Register and Receive $500 Bonus, Start Your Cloud Mining Journey

    To help more investors understand and experience cloud mining, BTC Miner is offering a $500 bonus to new users. By registering an account, users can claim this bonus and use it to purchase mining contracts, allowing them to experience zero-risk stable returns. This offer not only provides a risk-free opportunity for newcomers but also enables experienced investors to verify the platform’s stability and profit potential.

    Referral Rewards Program: Invite More, Earn More

    BTC Miner also offers an innovative Referral Rewards Program. By inviting friends to register and invest, users can earn up to 7% in referral rewards. Share your personal referral link, bring more people into the platform, and once your referrals start mining, you will earn rewards from their contract investments.

    This reward program not only encourages platform growth but also allows users to earn passive income through the social referral system. The more people you invite, the higher your earnings as their investments grow.

    FCA Certification: Ensuring Fund Security and Platform Compliance

    To ensure the platform’s legitimacy and the security of users’ funds, BTC Miner has obtained FCA (Financial Conduct Authority) certification. The FCA is one of the most stringent financial regulatory bodies in the world, and obtaining this certification means that the platform complies with strict regulatory standards, ensuring transparent and lawful operations. Investors can confidently invest, knowing their funds are protected in a secure, compliant environment.

    Investor Feedback: High Returns and Stability Praised

    Many investors have praised BTC Miner for its stable returns and transparent operations. Users from around the world have expressed their satisfaction with the platform, which provides not only stable returns but also a simple way to manage investments, greatly reducing their concerns about market volatility.

    John Davis, a U.S.-based investor, shared his experience: “In the fast-moving world of digital assets, finding a stable investment platform is rare. BTC Miner gave me peace of mind with guaranteed returns. The FCA certification gives me confidence, and I’m looking forward to continuing to increase my investment with the platform.”

    How to Join BTC Miner?

    1. Register an Account: Visit https://btcminer.net, fill in your details, and complete the registration.
    2. Claim Your $500 Bonus: New users can claim a $500 bonus upon registration to start cloud mining.
    3. Choose a Suitable Contract: Based on your budget and needs, select a mining contract that works for you.
    4. Start Earning: Your returns will be automatically credited daily, and you can choose to withdraw or reinvest.

    Summary:

    As the cryptocurrency market matures, BTC Miner stands out by offering innovative smart cloud mining and green energy mining solutions, providing a stable, high-return, low-risk platform for global investors. With FCA certification, fixed-return contracts, and a flexible Referral Rewards Program, BTC Miner makes it easy for anyone to enter the cloud mining world and earn passive income.

    Register today at BTC Miner and begin your cloud mining journey—turn stable high returns into your new investment strategy!

    Website: https://btcminer.net
    Email: info@btcminer.net

    Attachment

    The MIL Network

  • MIL-OSI: Bitget Wraps Up Anti-Scam Month with Over 65% of Participants Successfully Identifying Crypto Fraud Tactics

    Source: GlobeNewswire (MIL-OSI)

    VICTORIA, Seychelles, July 02, 2025 (GLOBE NEWSWIRE) — Bitget, the world’s leading cryptocurrency exchange and Web3 company, has successfully concluded its 2025 Anti-Scam Month, a global initiative aimed at elevating user awareness and resilience against Web3 fraud. Throughout June, Bitget rolled out a series of gamified education tools, expert collaborations, and industry research to confront the rising threat of AI-enabled scams and security breaches across the crypto ecosystem.

    At the heart of the campaign was the Smarter Eyes Challenge, an interactive comic-based mini-game simulating real-life scam scenarios—from phishing and social engineering to fake token approvals. While only 8.60% of participants spotted all traps on their first attempt, a striking 65.41% eventually passed all three levels after receiving guided security clues, underscoring both the scale of the awareness gap and the campaign’s tangible impact.

    Bitget published six in-depth blog posts tackling common attack vectors like SMS spoofing, fake apps, and high-risk tokens. Over 80% of users scored full marks in follow-up security quizzes, signaling a sharp improvement in scam detection capabilities following the campaign’s educational content.

    Another flagship milestone was the release of Bitget’s 2025 Anti-Scam Research Report, co-authored with blockchain security leaders SlowMist and Elliptic. The report revealed that global crypto scam losses surpassed $4.6 billion in 2024, with deepfakes and social engineering responsible for the majority of high-value attacks. The findings spotlighted the growing sophistication of AI-driven fraud, including synthetic public figure videos, Trojan-laced job offers, and fake Zoom calls used to deceive victims.

    Throughout the month, Bitget convened key voices in Web3 security—including Hacken, GoPlus, BlockSec, and Security Alliance—for an Anti-Scam X Space discussion. Experts weighed in on future threats, the evolving role of collaboration, and how users, platforms, and audit firms can work together to build a safer digital asset environment.

    “Anti-Scam Month reflects our belief that education is the first line of defense in crypto security,” said Gracy Chen, CEO of Bitget. “By turning passive users into active defenders, we’re laying the groundwork for a more resilient ecosystem. And this is only the beginning—the Anti-Scam Hub will remain open year-round as a permanent resource for our global community.”

    Echoing this sentiment, Yevheniia Broshevan, Co-Founder & CBDO at Hacken, said, “Anti-Scam Month by Bitget is a fantastic initiative and a powerful example for the industry, demonstrating how companies can raise awareness, educate users, and reduce the risk of future hacks. Education truly is a vital part of this journey.”

    Yajin (Andy) Zhou, Co-Founder & CEO at BlockSec, added, “Hackers study user habits, such as copying addresses from transaction histories. Security efforts must focus on proactive defenses rather than blaming users. Security is not a solo battlefield. Blockchain platforms, compliance tools, and security firms must share threat intelligence to build a united defense system.”

    Michael Lewellen, Technical Council at Security Alliance, emphasized, “Security isn’t about being impossible to hack or scam users. It’s just being hard enough to discourage threat actors from investing effort in the attempt. We need to harden Web3 infrastructure enough so that this ecosystem is no longer an easy, profitable target.”

    The Bitget Anti-Scam Hub, now permanently live, offers users ongoing access to practical safety guides, real-time scam indicators, the official verification channel, and a crypto safety kit with 24/7 global support.

    For more details, please visit the Bitget Anti-Scam Hub here.

    About Bitget

    Established in 2018, Bitget is the world’s leading cryptocurrency exchange and Web3 company. Serving over 120 million users in 150+ countries and regions, the Bitget exchange is committed to helping users trade smarter with its pioneering copy trading feature and other trading solutions, while offering real-time access to Bitcoin priceEthereum price, and other cryptocurrency prices. Formerly known as BitKeep, Bitget Wallet is a leading non-custodial crypto wallet supporting 130+ blockchains and millions of tokens. It offers multi-chain trading, staking, payments, and direct access to 20,000+ DApps, with advanced swaps and market insights built into a single platform. Bitget is at the forefront of driving crypto adoption through strategic partnerships, such as its role as the Official Crypto Partner of the World’s Top Football League, LALIGA, in EASTERN, SEA and LATAM markets, as well as a global partner of Turkish National athletes Buse Tosun Çavuşoğlu (Wrestling world champion), Samet Gümüş (Boxing gold medalist) and İlkin Aydın (Volleyball national team), to inspire the global community to embrace the future of cryptocurrency.

    For more information, visit: WebsiteTwitterTelegramLinkedInDiscordBitget Wallet
    For media inquiries, please contact: media@bitget.com

    Risk Warning: Digital asset prices are subject to fluctuation and may experience significant volatility. Investors are advised to only allocate funds they can afford to lose. The value of any investment may be impacted, and there is a possibility that financial objectives may not be met, nor the principal investment recovered. Independent financial advice should always be sought, and personal financial experience and standing carefully considered. Past performance is not a reliable indicator of future results. Bitget accepts no liability for any potential losses incurred. Nothing contained herein should be construed as financial advice. For further information, please refer to our Terms of Use.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/a8d159ce-8a24-4435-a26b-bbe8c16cee3d

    The MIL Network

  • MIL-OSI: Bitget Wraps Up Anti-Scam Month with Over 65% of Participants Successfully Identifying Crypto Fraud Tactics

    Source: GlobeNewswire (MIL-OSI)

    VICTORIA, Seychelles, July 02, 2025 (GLOBE NEWSWIRE) — Bitget, the world’s leading cryptocurrency exchange and Web3 company, has successfully concluded its 2025 Anti-Scam Month, a global initiative aimed at elevating user awareness and resilience against Web3 fraud. Throughout June, Bitget rolled out a series of gamified education tools, expert collaborations, and industry research to confront the rising threat of AI-enabled scams and security breaches across the crypto ecosystem.

    At the heart of the campaign was the Smarter Eyes Challenge, an interactive comic-based mini-game simulating real-life scam scenarios—from phishing and social engineering to fake token approvals. While only 8.60% of participants spotted all traps on their first attempt, a striking 65.41% eventually passed all three levels after receiving guided security clues, underscoring both the scale of the awareness gap and the campaign’s tangible impact.

    Bitget published six in-depth blog posts tackling common attack vectors like SMS spoofing, fake apps, and high-risk tokens. Over 80% of users scored full marks in follow-up security quizzes, signaling a sharp improvement in scam detection capabilities following the campaign’s educational content.

    Another flagship milestone was the release of Bitget’s 2025 Anti-Scam Research Report, co-authored with blockchain security leaders SlowMist and Elliptic. The report revealed that global crypto scam losses surpassed $4.6 billion in 2024, with deepfakes and social engineering responsible for the majority of high-value attacks. The findings spotlighted the growing sophistication of AI-driven fraud, including synthetic public figure videos, Trojan-laced job offers, and fake Zoom calls used to deceive victims.

    Throughout the month, Bitget convened key voices in Web3 security—including Hacken, GoPlus, BlockSec, and Security Alliance—for an Anti-Scam X Space discussion. Experts weighed in on future threats, the evolving role of collaboration, and how users, platforms, and audit firms can work together to build a safer digital asset environment.

    “Anti-Scam Month reflects our belief that education is the first line of defense in crypto security,” said Gracy Chen, CEO of Bitget. “By turning passive users into active defenders, we’re laying the groundwork for a more resilient ecosystem. And this is only the beginning—the Anti-Scam Hub will remain open year-round as a permanent resource for our global community.”

    Echoing this sentiment, Yevheniia Broshevan, Co-Founder & CBDO at Hacken, said, “Anti-Scam Month by Bitget is a fantastic initiative and a powerful example for the industry, demonstrating how companies can raise awareness, educate users, and reduce the risk of future hacks. Education truly is a vital part of this journey.”

    Yajin (Andy) Zhou, Co-Founder & CEO at BlockSec, added, “Hackers study user habits, such as copying addresses from transaction histories. Security efforts must focus on proactive defenses rather than blaming users. Security is not a solo battlefield. Blockchain platforms, compliance tools, and security firms must share threat intelligence to build a united defense system.”

    Michael Lewellen, Technical Council at Security Alliance, emphasized, “Security isn’t about being impossible to hack or scam users. It’s just being hard enough to discourage threat actors from investing effort in the attempt. We need to harden Web3 infrastructure enough so that this ecosystem is no longer an easy, profitable target.”

    The Bitget Anti-Scam Hub, now permanently live, offers users ongoing access to practical safety guides, real-time scam indicators, the official verification channel, and a crypto safety kit with 24/7 global support.

    For more details, please visit the Bitget Anti-Scam Hub here.

    About Bitget

    Established in 2018, Bitget is the world’s leading cryptocurrency exchange and Web3 company. Serving over 120 million users in 150+ countries and regions, the Bitget exchange is committed to helping users trade smarter with its pioneering copy trading feature and other trading solutions, while offering real-time access to Bitcoin priceEthereum price, and other cryptocurrency prices. Formerly known as BitKeep, Bitget Wallet is a leading non-custodial crypto wallet supporting 130+ blockchains and millions of tokens. It offers multi-chain trading, staking, payments, and direct access to 20,000+ DApps, with advanced swaps and market insights built into a single platform. Bitget is at the forefront of driving crypto adoption through strategic partnerships, such as its role as the Official Crypto Partner of the World’s Top Football League, LALIGA, in EASTERN, SEA and LATAM markets, as well as a global partner of Turkish National athletes Buse Tosun Çavuşoğlu (Wrestling world champion), Samet Gümüş (Boxing gold medalist) and İlkin Aydın (Volleyball national team), to inspire the global community to embrace the future of cryptocurrency.

    For more information, visit: WebsiteTwitterTelegramLinkedInDiscordBitget Wallet
    For media inquiries, please contact: media@bitget.com

    Risk Warning: Digital asset prices are subject to fluctuation and may experience significant volatility. Investors are advised to only allocate funds they can afford to lose. The value of any investment may be impacted, and there is a possibility that financial objectives may not be met, nor the principal investment recovered. Independent financial advice should always be sought, and personal financial experience and standing carefully considered. Past performance is not a reliable indicator of future results. Bitget accepts no liability for any potential losses incurred. Nothing contained herein should be construed as financial advice. For further information, please refer to our Terms of Use.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/a8d159ce-8a24-4435-a26b-bbe8c16cee3d

    The MIL Network

  • MIL-OSI Russia: Beijing launches city alliance to strengthen global digital economy ties

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BEIJING, July 2 (Xinhua) — A global alliance involving more than 40 cities was formally launched in Beijing on Wednesday as part of efforts to expand multilateral cooperation on the digital economy.

    The Global Alliance of Digital Economy Cities was launched by Beijing together with partner cities from Europe, North America, Asia-Pacific, the Middle East and Latin America at the 2025 Global Conference on the Digital Economy, which opened on the same day.

    The Alliance aims to institutionalise multilateral cooperation beyond bilateral projects and will focus on key areas such as digital infrastructure, governance of cross-border data flows, the ethics of artificial intelligence and the application of smart cities.

    Earlier in 2023, Beijing launched the Digital Economy Partnership City Cooperation Initiative, and in 2024, the Chinese capital and partner cities adopted six action plans to implement the initiative. The current alliance was created with the support of international organizations including the United Nations Institute for Training and Research, the International Telecommunication Union, and the International Trade Centre.

    The 2025 Global Conference on Digital Economy will run until July 5, featuring an opening ceremony, six key forums, and a series of thematic sessions, with more than 1,000 participants. The event is jointly organized by the Beijing Municipal People’s Government, the National Internet Information Office of China, the National Data Administration of China, the Xinhua News Agency, and the United Nations Development Programme. –0–

    MIL OSI Russia News

  • MIL-OSI Security: Serial Hacker ‘IntelBroker’ Charged for Causing $25 Million in Damages to Victims

    Source: US FBI

    Kai West, a British National, Is Charged With Operating the “IntelBroker” Online Identity, Infiltrating Victim Computer Networks, Stealing Data, Selling It, and Causing Millions in Damages to Dozens of Victims Around the World

    The United States Attorney for the Southern District of New York, Jay Clayton, and the Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), Christopher G. Raia, announced the unsealing of a four-count criminal Indictment and Complaint charging KAI WEST, a/k/a “IntelBroker,” a/k/a “Kyle Northern,” with a years-long hacking scheme committed through the online identity “IntelBroker.”  WEST, using the IntelBroker identity, conspired with an online group named the CyberN[——], to steal data from a telecommunications company, municipal health care provider, an Internet service provider, and more than 40 other victims.  WEST, and his online co-conspirators, took that stolen data, and offered it for sale online for more than $2 million.  Collectively, WEST, through the “IntelBroker” identity and his online co-conspirators, caused in excess of $25 million in damages to victims.  WEST was arrested in France in February 2025, and the United States is seeking his extradition.  The case has been assigned to U.S. District Judge Katherine Polk Failla.

    “The IntelBroker alias has caused millions in damages to victims around the world,” said U.S. Attorney Jay Clayton.  “This action reflects the FBI’s commitment to pursuing cybercriminals around the world.  New Yorkers are all too often the victims of intentional cyber schemes and our office is committed to bringing these remote actors to justice.”

    “Kai West, an alleged serial hacker, is charged for a nefarious, years-long scheme to steal victim’s data and sell it for millions in illicit funds, causing more than $25 million in damages worldwide,” said FBI Assistant Director in Charge Christopher G. Raia.  “Today’s announcement should serve as a warning to anyone thinking they can hide behind a keyboard and commit cyber-crime with impunity; the FBI will find and hold you accountable no matter where you are.”

    As alleged in the Indictment and Complaint:[1]

    “IntelBroker” is the online moniker of WEST, who, in concert with his co-conspirators, compromised victims’ (typically companies) computer systems, exfiltrated data from those systems (e.g. customer lists and company marketing data), and then sold the stolen data for profit.  WEST accomplished his scheme in connection with his leadership of an online hacking group called the “CyberN[——],” which frequented a particular internet forum (“Forum-1”).

    Between approximately 2023 to 2025, WEST offered hacked data for sale approximately 41 times; and offered to distribute hacked data for free (or for Forum-1 credits) approximately 117 times. WEST, and his co-conspirators, have sought to collect at least approximately $2,000,000 by selling the stolen data.  Based on information received from the victims of these breaches, WEST and his co-conspirators have cumulatively caused victim losses of at least $25,000,000.

    Based on a review of WEST’s IntelBroker Forum-1 posts, approximately 158 threads started by WEST offered stolen data for sale, for Forum-1 credit, or for free, since in or about January 2023 through in or about February 2025.  At least 41 of those 158 public messages sell data from companies based in the United States.  Of those 158 messages, approximately 16 provided a specific asking price for the stolen data, which cumulatively totals at least $2,467,000. At least 25 of the 158 public messages invited Forum‑1 users to private message IntelBroker (i.e. WEST) to negotiate a sales price.  The remaining 117 public messages offer hacked data for free to Forum-1 users or in exchange for Forum-1 credits.  At least 46 of the 158 public messages indicate that WEST worked in concert with a particular Forum-1 user (“CC-1”) to obtain the data through a “breach” (i.e. “hack”).  WEST’s public messages (as IntelBroker) indicate that he accepts payment via Monero, which is a cryptocurrency that uses a blockchain with privacy-enhancing technologies to attempt to obfuscate transactions and seek to achieve anonymity and fungibility.

    WEST’s prolific posting (as IntelBroker), and his sales of stolen data, have generated notoriety for the IntelBroker identity within the Forum-1 community. Indeed, from in or about August 2024 through in or about January 2025, “IntelBroker” was identified on Forum-1 as the site’s “owner.”  To further his username’s notoriety, WEST has associated different images with IntelBroker but primarily uses the following image as his calling card:

    WEST’s victims include a U.S.-based telecommunications provider.  WEST, using the IntelBroker moniker, sold data from that telecommunications company, which included information about its customers.  That data was accessed by WEST by illegally accessing a server which was improperly configured.  On or about March 6, 2023, WEST, using the IntelBroker moniker, authored a public message on Forum-1 titled “CyberN[——] [redacted reference to Victim] Database.”  In that post, WEST offered for sale data from a municipal healthcare provider which included patient data such as names, Social Security numbers, dates of birth, genders, health plan information, employer information, among other information, from the victim’s patients. 

    *               *                *

    WEST, 25, a British national, is charged with conspiracy to commit computer intrusions, which carries a maximum sentence of five years in prison; conspiracy to commit wire fraud, which carries a maximum sentence of 20 years in prison; accessing a protected computer to obtain information, which carries a maximum sentence of five years in prison; and wire fraud, which carries a maximum sentence of 20 years in prison.

    The maximum potential sentences are prescribed by Congress and provided here for informational purposes only, as any sentencing of the defendant will be determined by a judge.

    Mr. Clayton praised the outstanding work of the FBI and the Office of International Affairs of the Department of Justice’s Criminal Division.  He also thanked the French, Spanish, British, and Dutch authorities for their assistance. 

    The case is being prosecuted by the Office’s Complex Frauds and Cybercrime Unit. Assistant U.S. Attorney Ryan B. Finkel is in charge of the prosecution.

    The charges contained in the Indictment and Complaint are merely accusations, and the defendant is presumed innocent unless and until proven guilty.
     


    [1] As the introductory phrase signifies, the entirety of the text of the Indictment and the Complaint, and the descriptions set forth herein, constitutes only allegations, and every fact described therein should be treated as an allegation.

    MIL Security OSI

  • MIL-OSI Security: ATF Warns Public of Scam Involving Fraudulent Calls

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    Washington, D.C. – The Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) is alerting the public to a scam involving fraudulent phone calls from individuals claiming to be “ATF Officers” or “Agents.” These scammers, using phone numbers appearing to originate from Martinsburg, West Virginia, are instructing victims to purchase Apple gift cards in amounts of $500 or $1,000 to “clear a red flag” from their accounts. Victims are then asked to provide gift card numbers to the callers.

    The ATF emphasizes that these calls are not legitimate and is working with the Federal Bureau of Investigation (FBI), which is actively investigating this scam. The public is urged to exercise caution and avoid sharing personal or financial information with unsolicited callers.

    ATF Will Never:

    • Call or email private citizens to demand payment or threaten arrest. You will not be asked to wire a “settlement” to avoid arrest.
    • Ask you to use large sums of your own money to help catch a criminal.
    • Request you send money via wire transfer to foreign accounts, cryptocurrency, or gift/prepaid cards.
    • Call you about “frozen” Social Security numbers or to coordinate inheritances.

    How to Protect Yourself:

    • Do not share personal or financial information with unsolicited callers or emails.
    • Verify the legitimacy of any contact claiming to be from a government agency by calling official numbers listed on agency websites, such as www.atf.gov.
    • Report suspicious calls to the ATF at 1-888-ATF-TIPS (1-888-283-8477) or the FBI’s Internet Crime Complaint Center at www.ic3.gov.
    • If you have been a victim of this scam, contact your local law enforcement immediately.

    Disclaimer on ATF.gov

    ATF enhanced its websites by adding a prominent disclaimer to outline what ATF will never do, reinforcing public awareness and protection against scams. For more information or to report suspicious activity, contact your local ATF field office or visit www.atf.gov/contact/submit-a-tip.

    ATF is the lead federal law enforcement agency with jurisdiction involving firearms and violent crimes, and enforces criminal and regulatory laws involving bombs, explosives, and arson. More information about ATF and its programs is available at www.atf.gov. For more information, contact ATF Public Affairs Division at liaison2@atf.gov.

    ###

    MIL Security OSI

  • MIL-OSI USA: Klobuchar, Capito Bipartisan Rural Broadband Protection Act Passes the Senate

    US Senate News:

    Source: United States Senator Amy Klobuchar (D-Minn)

    WASHINGTON – U.S. Senator Amy Klobuchar (D-MN) released the statement below following the Senate passage of the bipartisan Rural Broadband Protection Act. The bill, which Klobuchar leads with Senator Shelley Moore Capito (R-WV), would require the Federal Communications Commission (FCC) to establish a more thorough vetting process to ensure that providers applying for federal funding are capable of delivering reliable broadband access to underserved, rural communities. 

    “We should be able to bring high-speed internet to every family in Minnesota— regardless of their zip code,” said Klobuchar. “This bipartisan legislation will help Americans connect to work, school, health care, and business opportunities by ensuring the companies that apply for federal funding to build out broadband infrastructure can get the job done. As co-chair of the Senate Broadband Caucus, I’ll keep fighting to close the digital divide and ensure Minnesota families can reliably access the high-speed internet they need.” 

    “I have long been dedicated to making sure West Virginians have the broadband connectivity they need and deserve. This legislation expands on my previous broadband efforts, and is a product of many discussions I’ve had with small rural service providers and local leaders in West Virginia. As we continue our efforts to close the digital divide in West Virginia – this bill will make sure that Universal Service Fund dollars are not wasted, and ensure that funding is being used properly to fund broadband deployment in rural areas. The Senate passage of this legislation is another positive step in connecting every last home, school, and business in West Virginia. I urge the House to quickly pass this legislation,” Capito said.

    Klobuchar has long led efforts to expand broadband access, support rural broadband, and bridge the digital divide.

    The Accessible, Affordable Internet for All Act, Klobuchar’s legislation with Former House Majority Whip Jim Clyburn (D-SC) to expand high-speed internet nationwide, served as the basis for the program created by the Bipartisan Infrastructure Law. Klobuchar is working hard to ensure the program is implemented expeditiously and as Congress intended. In June 2025, after the Department of Commerce announced substantial changes to the implementation of the BEAD program, she and Former House Majority Whip Clyburn called on the Administration to reverse course and fully implement broadband. 

    Klobuchar is also committed to strengthening the  Universal Service Fund (USF), which promotes universal access to broadband and other telecommunications services and supports critical connections for schools, libraries and healthcare facilities in rural communities. Currently, the USF is primarily funded through landline fees, disproportionately impacting seniors, who are more likely to use landlines than other Americans. In June 2025, she again joined the USF Working Group to improve this funding structure. In January 2025, she joined a bipartisan group of colleagues in filing an amicus brief to the Supreme Court in support of upholding the USF. The Court ruled in their favor in June 2025. In March 2023, Klobuchar also reintroduced bipartisan legislation, with Senators John Thune (R-SD), John Hickenlooper (D-CO), and Jerry Moran (R-KS), to strengthen the USF’s funding mechanism. 

    MIL OSI USA News

  • States, UTs hold talks on strengthening higher education’s role in knowledge economy

    Source: Government of India

    Source: Government of India (4)

    In the run-up to the 5th National Conference of Chief Secretaries, the Department of Higher Education on Wednesday organised a national workshop with states and Union Territories on the theme ‘Higher Education: Knowledge Economy’.

    The day-long session, held at the Pragyan Auditorium of the AICTE in New Delhi, brought together senior officials and experts to discuss how higher education can help build a skilled and future-ready workforce for Viksit Bharat.

    The workshop, held in collaboration with the Department of Agricultural Research and Education (DARE), is part of a series of preparatory meetings ahead of the Chief Secretaries’ Conference, which will be held later this year under the broader theme ‘Human Capital for Viksit Bharat’. A concept note outlining the sub-theme had been shared with all states and UTs in advance to align local perspectives with national goals.

    Speaking at the event, Dr Vineet Joshi, Secretary, Department of Higher Education, said states and UTs have a vital role in shaping India’s education sector and driving the country’s development. “If states improve, Bharat improves,” he said, urging states to make better use of existing schemes, adapt policies to local needs, and involve communities beyond state capitals. He described the concept note as a starting point for states to design transformative changes.

    Dr Mangi Lal Jat, Secretary, DARE, called for modernising agricultural education by adopting new technologies such as artificial intelligence, machine learning and behavioural sciences. He also highlighted the need for collaboration between agricultural universities, IITs and other institutions to help students tackle challenges in the agriculture value chain.

    Former UGC Chairman Prof M Jagadesh Kumar spoke about the National Education Policy 2020 and its aim to break down rigid academic barriers and promote interdisciplinary learning. He said the focus should be on nurturing curiosity and adaptability among students and pointed to frameworks such as the National Credit Framework and National Higher Education Qualification Framework as tools for driving innovation.

    AICTE Chairman Prof T G Sitharam stressed the need for India to move from a service-based economy to a product-driven one by integrating robotics, artificial intelligence and other advanced technologies into technical education. He mentioned initiatives like the Smart India Hackathon, the AICTE Internship Portal and the E-Kumbh Portal, which provides free textbooks in various Indian languages.

    States also shared their experiences and local plans. Officials from Maharashtra spoke about developing EduCity in Navi Mumbai and setting up offshore campuses to make the state a global education hub. Universities discussed including Indian Knowledge Systems in mainstream curricula to preserve traditional knowledge alongside modern learning.

    Some states highlighted the need to address brain drain by encouraging Indian scholars abroad to return and contribute to domestic institutions through research collaborations and sabbaticals. Others underlined the need to close faculty gaps and improve infrastructure so that state public universities can match the standards of national institutions. Karnataka officials showcased initiatives such as Nipuna Karnataka and digital learning tools to equip students with industry-ready skills.

    States and UTs have been asked to gather inputs from officers, including those working at the grassroots level, and submit detailed feedback notes by August 20, 2025. State-specific reports are expected by August 31. These submissions will help prepare the background material for the Chief Secretaries’ Conference and guide future discussions on strengthening higher education as a key part of India’s knowledge economy.

  • States, UTs hold talks on strengthening higher education’s role in knowledge economy

    Source: Government of India

    Source: Government of India (4)

    In the run-up to the 5th National Conference of Chief Secretaries, the Department of Higher Education on Wednesday organised a national workshop with states and Union Territories on the theme ‘Higher Education: Knowledge Economy’.

    The day-long session, held at the Pragyan Auditorium of the AICTE in New Delhi, brought together senior officials and experts to discuss how higher education can help build a skilled and future-ready workforce for Viksit Bharat.

    The workshop, held in collaboration with the Department of Agricultural Research and Education (DARE), is part of a series of preparatory meetings ahead of the Chief Secretaries’ Conference, which will be held later this year under the broader theme ‘Human Capital for Viksit Bharat’. A concept note outlining the sub-theme had been shared with all states and UTs in advance to align local perspectives with national goals.

    Speaking at the event, Dr Vineet Joshi, Secretary, Department of Higher Education, said states and UTs have a vital role in shaping India’s education sector and driving the country’s development. “If states improve, Bharat improves,” he said, urging states to make better use of existing schemes, adapt policies to local needs, and involve communities beyond state capitals. He described the concept note as a starting point for states to design transformative changes.

    Dr Mangi Lal Jat, Secretary, DARE, called for modernising agricultural education by adopting new technologies such as artificial intelligence, machine learning and behavioural sciences. He also highlighted the need for collaboration between agricultural universities, IITs and other institutions to help students tackle challenges in the agriculture value chain.

    Former UGC Chairman Prof M Jagadesh Kumar spoke about the National Education Policy 2020 and its aim to break down rigid academic barriers and promote interdisciplinary learning. He said the focus should be on nurturing curiosity and adaptability among students and pointed to frameworks such as the National Credit Framework and National Higher Education Qualification Framework as tools for driving innovation.

    AICTE Chairman Prof T G Sitharam stressed the need for India to move from a service-based economy to a product-driven one by integrating robotics, artificial intelligence and other advanced technologies into technical education. He mentioned initiatives like the Smart India Hackathon, the AICTE Internship Portal and the E-Kumbh Portal, which provides free textbooks in various Indian languages.

    States also shared their experiences and local plans. Officials from Maharashtra spoke about developing EduCity in Navi Mumbai and setting up offshore campuses to make the state a global education hub. Universities discussed including Indian Knowledge Systems in mainstream curricula to preserve traditional knowledge alongside modern learning.

    Some states highlighted the need to address brain drain by encouraging Indian scholars abroad to return and contribute to domestic institutions through research collaborations and sabbaticals. Others underlined the need to close faculty gaps and improve infrastructure so that state public universities can match the standards of national institutions. Karnataka officials showcased initiatives such as Nipuna Karnataka and digital learning tools to equip students with industry-ready skills.

    States and UTs have been asked to gather inputs from officers, including those working at the grassroots level, and submit detailed feedback notes by August 20, 2025. State-specific reports are expected by August 31. These submissions will help prepare the background material for the Chief Secretaries’ Conference and guide future discussions on strengthening higher education as a key part of India’s knowledge economy.

  • MIL-OSI: Alaris Equity Partners Announces Timing of 2025 Q2 Financial Results, Conference Call and Webcast

    Source: GlobeNewswire (MIL-OSI)

    NOT FOR DISTRIBUTION IN THE UNITED STATES.
    FAILURE TO COMPLY WITH THIS RESTRICTION MAY CONSTITUTE A VIOLATION OF UNITED STATES SECURITIES LAW.

    CALGARY, Alberta, July 02, 2025 (GLOBE NEWSWIRE) — Alaris Equity Partners Income Trust (“Alaris” or the “Trust“) (TSX: AD.UN) is pleased to announce that it will release its financial results for the three and six months ended June 30, 2025 following the closing of regular trading on the Toronto Stock Exchange Thursday, August 7, 2025. Alaris management will host a conference call at 9 am MT (11am ET) the following day, Friday, August 8, 2025 to discuss the financial results and outlook for the Trust.

    Participants must register for the call using this link: Pre-registration to Q2 to receive the dial-in numbers and unique PIN to access the call seamlessly. It is recommended that you join 10 minutes prior to the event start (although you may register and dial in at any time during the call). Participants can access the webcast here: Q2 webcast. A replay of the webcast will be available two hours after the call and archived on the same web page for six months. Participants can also find the link on our website, stored under the “Investors” section – “Presentations and Events”, at www.alarisequitypartners.com.

    About Alaris

    The Trust, through its subsidiaries, invests in a diversified group of private businesses (“Private Company Partners”) primarily through structured equity. The primary goal of our structured equity investments is to deliver stable and predictable returns to our unitholders through both cash distributions and capital appreciation. This strategy is enhanced by common equity positions, which allow us to generate returns in alignment with the founders of our Private Company Partners.

    For further information please contact:

    Investor Relations
    P: (403) 260-1457
    ir@alarisequity.com  

    Alaris Equity Partners Income Trust
    Suite 250, 333 24th Avenue S.W.
    Calgary, Alberta T2S 3E6
    www.alarisequitypartners.com  

    The MIL Network

  • MIL-OSI: Drone as a Service (DaaS) Market is Booming Expected to Reach $179 Billion By 2030

    Source: GlobeNewswire (MIL-OSI)

    PALM BEACH, Fla., July 02, 2025 (GLOBE NEWSWIRE) — FN Media Group News Commentary – The integration of the Internet of Things (IoT) in agriculture will increasingly involve a sophisticated interplay of robots, drones, remote sensors, and computer imaging. A report from MarketsAndMarkets said: “The overall drones as a service market will reach $179.3 billion by 2030. Surveillance and monitoring will be the largest revenue opportunity through 2030 High potential industry verticals include construction, insurance, aerospace and real estate Surveillance and mapping remain largest opportunities with maintenance and inspection rapidly gaining ground as high ROI solutions and Developing countries are fastest growing for many solutions due largely to substantial cost avoidance for expensive professional services.” It continued: “The fundamental principle underpinning cloud computing is the decentralization of computational resources. It posits that the physical infrastructure required for processing data and running applications no longer necessitates a local presence within a customer’s own facilities. Furthermore, the precise geographical location of these computing resources becomes largely immaterial to the end-user. Imagine, if you will, computational power existing almost ubiquitously, like a utility that can be tapped into whenever and wherever the need arises. This abstract notion of computing residing “in the ether” highlights the on-demand and location-independent nature of the cloud.” Active Companies in the markets today include ZenaTech, Inc. (NASDAQ: ZENA), Deere & Company (NYSE: DE), EHang Holdings Limited (NASDAQ: EH), AGCO Corporation (NYSE: AGCO), AgEagle Aerial Systems Inc. (NYSE: UAVS).

    MarketsAndMarkets added: “This shift in paradigm has yielded significant advantages. Firstly, it has dramatically improved the utilization of computing assets. Instead of individual organizations maintaining underutilized servers and infrastructure, cloud providers can aggregate demand from numerous customers, leading to far greater efficiency. The evolution of cloud computing has fostered the “as a service” delivery model. This framework provides computational capabilities – be it processing power, storage, or specialized software – as a service that can be accessed over a network, typically the internet. This “as a service” approach has proven to be an exceptionally adaptable and scalable method for organizations to introduce and expand their computational capabilities without the upfront investment and management overhead associated with traditional IT infrastructure. This transformative “as a service” paradigm is now profoundly impacting the field of robotics. It is paving the way for “automation as a service”, where robotic capabilities are offered as a readily available service rather than requiring the outright purchase and maintenance of physical robots. This shift unlocks new possibilities for businesses that may have previously found robotics cost-prohibitive or lacked the in-house expertise to deploy and manage them effectively.”

    ZenaTech (NASDAQ:ZENA) Expands Drone as a Service (DaaS) to California with Offer to Acquire an Engineering and Surveying Firm, Tapping into Precision Agriculture and Viticulture Market – ZenaTech, Inc. (FSE: 49Q) (BMV: ZENA) (“ZenaTech”), a technology company specializing in AI (Artificial Intelligence) drone, Drone as a Service (DaaS), and enterprise SaaS, has signed an offer to acquire a California-based civil engineering and land surveying firm with a well established history of operations. This marks ZenaTech’s first proposed transaction in the US West Coast or Southwest region, creating a strategic entry point into California ─ a high-value market for drone-based precision agriculture due to a massive agriculture economy, crop diversity, labor and water challenges, and an openness to innovation.

    With a commercial, construction and sustainability solution customer base and a deep regional presence, the proposed acquisition positions ZenaTech to scale its Drone as a Service or DaaS survey operations. It also provides significant opportunity to expand into California’s wine and agriculture sectors using advanced drone capabilities including aerial imaging, precision spraying, irrigation analytics, and wildfire detection and monitoring in high-risk areas.

    “This proposed acquisition is more than just our first Southwest region location — it’s a strategic foothold into a high-value, high-growth state for precision agriculture,” said Shaun Passley, Ph.D., CEO of ZenaTech. “The firm is a natural fit to help execute our growth strategy for crop health monitoring and precision spraying to serve viticulture, large estates, and commercial farming operations across California.”

    With the global agricultural drone market projected to reach USD 10.3 billion by 2030, driven by rising demand for precision technologies in farming, California stands out as a key growth region as well as being home to nearly 90% of all US vineyard acreage. Considering California’s mounting climate and agricultural challenges, ZenaTech’s AI-powered autonomous drone solutions offer timely, scalable innovation that serves the needs of commercial enterprises, cooperatives, agriculture consultants, and public sector stakeholders.

    ZenaTech’s Drone as a Service (DaaS) business model offers both business and government customers reduced costs and convenience to utilize drones to streamline legacy processes and manual tasks such as inspections, surveying, maintenance, precision agriculture and inventory management ─ there is no need to purchase drone hardware and software, find a drone pilot, manage maintenance and operation, or acquire regulatory approvals. The model also offers scalability to use more often or less often based on business needs and utilizes ZenaDrone’s multifunction AI autonomous drones.

    The company has closed six acquisitions across the US to date as part of its DaaS business model and strategy and has announced it plans to complete approximately 20 more in the next 12 months. Continued… Read this full release by visiting: https://www.financialnewsmedia.com/news-zena/

    Other recent developments in the markets include:

    Deere & Company (NYSE: DE) recently announced it has purchased Sentera, a St. Paul, Minnesota-based agriculture startup that uses smart imagery technology to monitor crop health via drone cameras.

    The acquisition, announced May 23, allows the John Deere tractor maker to integrate Sentera’s technologies into its digital farm management system to help farmers make more data-backed decisions. Drones equipped with Sentera’s cameras can fly over fields at high speeds and take high-resolution images that are then processed to generate digital maps that locate harmful weeds and pests, assess crop health and identify any disease pressures, according to Deere.

    EHang Holdings Limited (NASDAQ: EH), the world’s leading urban air mobility (“UAM”) technology platform company, recently announced that it has entered into a strategic partnership agreement with Reignwood Aviation Group. Leveraging their respective strengths, the two parties will collaborate under China’s national strategy for developing the low-altitude economy, guided by the principles of technology empowerment, scenario-driven innovation, and global expansion. Together, they aim to set a global standard for integrating traditional general aviation with next-generation electric vertical take-off and landing (“eVTOL”) aircraft.

    According to the agreement, Reignwood Aviation Group plans to deploy eVTOLs at scale, prioritizing at its operational hubs in key cultural and tourism destinations. The partnership will begin with consumer-facing applications such as low-altitude tourism and related ground services. Over time, the cooperation will further expand to UAM field to build a three-dimensional urban transportation network. In the long term, the two parties aim to expand to more scenarios and low-altitude services including passenger transportation, aerial logistics, emergency response, etc.

    AGCO Corporation (NYSE: AGCO), a global leader in the design, manufacture and distribution of agricultural machinery and precision ag technology, recently announced it has entered into a set of agreements with Tractors and Farm Equipment Limited (“TAFE”). The agreements resolve all outstanding disputes and other matters related to the commercial relationship between AGCO and TAFE as well as TAFE’s shareholding in AGCO, ownership and use of the Massey Ferguson brand in India and certain other countries, and other key governance issues between the parties.

    The agreements will become effective upon the completion by AGCO and TAFE of certain governmental and other processes in India relating to the repurchase of the shares held by AGCO in TAFE.

    AgEagle Aerial Systems Inc. (NYSE: UAVS), a leading provider of advanced drone and aerial imaging solutions, recently announced the sale of two additional eBee X drones to South Korea, expanding the country’s installed base of AgEagle’s eBee drones to more than 100 units. This milestone strengthens AgEagle’s strategic partnership with South Korea and reinforces its position as a leader in the Asia-Pacific drone market.

    The eBee X, AgEagle’s flagship fixed-wing mapping drone, is engineered for high-precision geospatial data collection and is ideally suited for applications including surveying, mapping, and photogrammetry. This latest sale builds on a well-established fleet, further strengthening AgEagle’s reputation as a trusted provider of cutting-edge unmanned aerial systems.AgEagle CEO Bill Irby commented, “Achieving our 100th eBee drone sale in South Korea represents a key growth milestone. It reflects the growing global demand for our advanced aerial solutions and validates the strength of our platform across a range of industries and geographies. As adoption accelerates in international markets like South Korea, we remain focused on scaling operations, deepening customer relationships, and delivering high-performance drone systems that meet evolving mission needs. This progress directly supports our commitment to building sustainable value for all our stakeholders.”

    About FN Media Group:
    At FN Media Group, via our top-rated online news portal at www.financialnewsmedia.com, we are one of the very few select firms providing top tier one syndicated news distribution, targeted ticker tag press releases and stock market news coverage for today’s emerging companies. #tickertagpressreleases #pressreleases

    Follow us on Facebook to receive the latest news updates: https://www.facebook.com/financialnewsmedia
    Follow us on Twitter for real time Market News: https://twitter.com/FNMgroup
    Follow us on Linkedin: https://www.linkedin.com/in/financialnewsmedia/

    DISCLAIMER: FN Media Group LLC (FNM), which owns and operates FinancialNewsMedia.com and MarketNewsUpdates.com, is a third party publisher and news dissemination service provider, which disseminates electronic information through multiple online media channels. FNM is NOT affiliated in any manner with any company mentioned herein. FNM and its affiliated companies are a news dissemination solutions provider and are NOT a registered broker/dealer/analyst/adviser, holds no investment licenses and may NOT sell, offer to sell or offer to buy any security. FNM’s market updates, news alerts and corporate profiles are NOT a solicitation or recommendation to buy, sell or hold securities. The material in this release is intended to be strictly informational and is NEVER to be construed or interpreted as research material. All readers are strongly urged to perform research and due diligence on their own and consult a licensed financial professional before considering any level of investing in stocks. All material included herein is republished content and details which were previously disseminated by the companies mentioned in this release. FNM is not liable for any investment decisions by its readers or subscribers. Investors are cautioned that they may lose all or a portion of their investment when investing in stocks. For current services performed FNM has been compensated fifty one hundred dollars for news coverage of the current press releases issued by ZenaTech, Inc. by the Company. FNM HOLDS NO SHARES OF ANY COMPANY NAMED IN THIS RELEASE.

    This release contains “forward-looking statements” within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E the Securities Exchange Act of 1934, as amended and such forward-looking statements are made pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. “Forward-looking statements” describe future expectations, plans, results, or strategies and are generally preceded by words such as “may”, “future”, “plan” or “planned”, “will” or “should”, “expected,” “anticipates”, “draft”, “eventually” or “projected”. You are cautioned that such statements are subject to a multitude of risks and uncertainties that could cause future circumstances, events, or results to differ materially from those projected in the forward-looking statements, including the risks that actual results may differ materially from those projected in the forward-looking statements as a result of various factors, and other risks identified in a company’s annual report on Form 10-K or 10-KSB and other filings made by such company with the Securities and Exchange Commission. You should consider these factors in evaluating the forward-looking statements included herein, and not place undue reliance on such statements. The forward-looking statements in this release are made as of the date hereof and FNM undertakes no obligation to update such statements.

    Contact Information:
    Media Contact email: editor@financialnewsmedia.com – +1(561)325-8757

    SOURCE: FN Media Group

    The MIL Network

  • MIL-OSI Economics: OEUK news Offshore Safety Awards 2025: Winners announced 2 July 2025

    Source: Offshore Energy UK

    Headline: OEUK news

    Offshore Safety Awards 2025: Winners announced

    2 July 2025

    Accessibility Statement

    • oeuk.org.uk
    • 2 July 2025

    Compliance status

    We firmly believe that the internet should be available and accessible to anyone, and are committed to providing a website that is accessible to the widest possible audience, regardless of circumstance and ability.

    To fulfill this, we aim to adhere as strictly as possible to the World Wide Web Consortium’s (W3C) Web Content Accessibility Guidelines 2.1 (WCAG 2.1) at the AA level. These guidelines explain how to make web content accessible to people with a wide array of disabilities. Complying with those guidelines helps us ensure that the website is accessible to all people: blind people, people with motor impairments, visual impairment, cognitive disabilities, and more.

    This website utilizes various technologies that are meant to make it as accessible as possible at all times. We utilize an accessibility interface that allows persons with specific disabilities to adjust the website’s UI (user interface) and design it to their personal needs.

    Additionally, the website utilizes an AI-based application that runs in the background and optimizes its accessibility level constantly. This application remediates the website’s HTML, adapts Its functionality and behavior for screen-readers used by the blind users, and for keyboard functions used by individuals with motor impairments.

    If you’ve found a malfunction or have ideas for improvement, we’ll be happy to hear from you. You can reach out to the website’s operators by using the following email [email protected]

    Screen-reader and keyboard navigation

    Our website implements the ARIA attributes (Accessible Rich Internet Applications) technique, alongside various different behavioral changes, to ensure blind users visiting with screen-readers are able to read, comprehend, and enjoy the website’s functions. As soon as a user with a screen-reader enters your site, they immediately receive a prompt to enter the Screen-Reader Profile so they can browse and operate your site effectively. Here’s how our website covers some of the most important screen-reader requirements, alongside console screenshots of code examples:

    1. Screen-reader optimization: we run a background process that learns the website’s components from top to bottom, to ensure ongoing compliance even when updating the website. In this process, we provide screen-readers with meaningful data using the ARIA set of attributes. For example, we provide accurate form labels; descriptions for actionable icons (social media icons, search icons, cart icons, etc.); validation guidance for form inputs; element roles such as buttons, menus, modal dialogues (popups), and others. Additionally, the background process scans all the website’s images and provides an accurate and meaningful image-object-recognition-based description as an ALT (alternate text) tag for images that are not described. It will also extract texts that are embedded within the image, using an OCR (optical character recognition) technology. To turn on screen-reader adjustments at any time, users need only to press the Alt+1 keyboard combination. Screen-reader users also get automatic announcements to turn the Screen-reader mode on as soon as they enter the website.

      These adjustments are compatible with all popular screen readers, including JAWS and NVDA.

    2. Keyboard navigation optimization: The background process also adjusts the website’s HTML, and adds various behaviors using JavaScript code to make the website operable by the keyboard. This includes the ability to navigate the website using the Tab and Shift+Tab keys, operate dropdowns with the arrow keys, close them with Esc, trigger buttons and links using the Enter key, navigate between radio and checkbox elements using the arrow keys, and fill them in with the Spacebar or Enter key.Additionally, keyboard users will find quick-navigation and content-skip menus, available at any time by clicking Alt+1, or as the first elements of the site while navigating with the keyboard. The background process also handles triggered popups by moving the keyboard focus towards them as soon as they appear, and not allow the focus drift outside it.

      Users can also use shortcuts such as “M” (menus), “H” (headings), “F” (forms), “B” (buttons), and “G” (graphics) to jump to specific elements.

    Disability profiles supported in our website

    • Epilepsy Safe Mode: this profile enables people with epilepsy to use the website safely by eliminating the risk of seizures that result from flashing or blinking animations and risky color combinations.
    • Visually Impaired Mode: this mode adjusts the website for the convenience of users with visual impairments such as Degrading Eyesight, Tunnel Vision, Cataract, Glaucoma, and others.
    • Cognitive Disability Mode: this mode provides different assistive options to help users with cognitive impairments such as Dyslexia, Autism, CVA, and others, to focus on the essential elements of the website more easily.
    • ADHD Friendly Mode: this mode helps users with ADHD and Neurodevelopmental disorders to read, browse, and focus on the main website elements more easily while significantly reducing distractions.
    • Blindness Mode: this mode configures the website to be compatible with screen-readers such as JAWS, NVDA, VoiceOver, and TalkBack. A screen-reader is software for blind users that is installed on a computer and smartphone, and websites must be compatible with it.
    • Keyboard Navigation Profile (Motor-Impaired): this profile enables motor-impaired persons to operate the website using the keyboard Tab, Shift+Tab, and the Enter keys. Users can also use shortcuts such as “M” (menus), “H” (headings), “F” (forms), “B” (buttons), and “G” (graphics) to jump to specific elements.

    Additional UI, design, and readability adjustments

    1. Font adjustments – users, can increase and decrease its size, change its family (type), adjust the spacing, alignment, line height, and more.
    2. Color adjustments – users can select various color contrast profiles such as light, dark, inverted, and monochrome. Additionally, users can swap color schemes of titles, texts, and backgrounds, with over seven different coloring options.
    3. Animations – person with epilepsy can stop all running animations with the click of a button. Animations controlled by the interface include videos, GIFs, and CSS flashing transitions.
    4. Content highlighting – users can choose to emphasize important elements such as links and titles. They can also choose to highlight focused or hovered elements only.
    5. Audio muting – users with hearing devices may experience headaches or other issues due to automatic audio playing. This option lets users mute the entire website instantly.
    6. Cognitive disorders – we utilize a search engine that is linked to Wikipedia and Wiktionary, allowing people with cognitive disorders to decipher meanings of phrases, initials, slang, and others.
    7. Additional functions – we provide users the option to change cursor color and size, use a printing mode, enable a virtual keyboard, and many other functions.

    Browser and assistive technology compatibility

    We aim to support the widest array of browsers and assistive technologies as possible, so our users can choose the best fitting tools for them, with as few limitations as possible. Therefore, we have worked very hard to be able to support all major systems that comprise over 95% of the user market share including Google Chrome, Mozilla Firefox, Apple Safari, Opera and Microsoft Edge, JAWS and NVDA (screen readers).

    Notes, comments, and feedback

    Despite our very best efforts to allow anybody to adjust the website to their needs. There may still be pages or sections that are not fully accessible, are in the process of becoming accessible, or are lacking an adequate technological solution to make them accessible. Still, we are continually improving our accessibility, adding, updating and improving its options and features, and developing and adopting new technologies. All this is meant to reach the optimal level of accessibility, following technological advancements. For any assistance, please reach out to [email protected]

    MIL OSI Economics

  • MIL-OSI Economics: OEUK news Offshore Safety Awards 2025: Winners announced 2 July 2025

    Source: Offshore Energy UK

    Headline: OEUK news

    Offshore Safety Awards 2025: Winners announced

    2 July 2025

    Accessibility Statement

    • oeuk.org.uk
    • 2 July 2025

    Compliance status

    We firmly believe that the internet should be available and accessible to anyone, and are committed to providing a website that is accessible to the widest possible audience, regardless of circumstance and ability.

    To fulfill this, we aim to adhere as strictly as possible to the World Wide Web Consortium’s (W3C) Web Content Accessibility Guidelines 2.1 (WCAG 2.1) at the AA level. These guidelines explain how to make web content accessible to people with a wide array of disabilities. Complying with those guidelines helps us ensure that the website is accessible to all people: blind people, people with motor impairments, visual impairment, cognitive disabilities, and more.

    This website utilizes various technologies that are meant to make it as accessible as possible at all times. We utilize an accessibility interface that allows persons with specific disabilities to adjust the website’s UI (user interface) and design it to their personal needs.

    Additionally, the website utilizes an AI-based application that runs in the background and optimizes its accessibility level constantly. This application remediates the website’s HTML, adapts Its functionality and behavior for screen-readers used by the blind users, and for keyboard functions used by individuals with motor impairments.

    If you’ve found a malfunction or have ideas for improvement, we’ll be happy to hear from you. You can reach out to the website’s operators by using the following email [email protected]

    Screen-reader and keyboard navigation

    Our website implements the ARIA attributes (Accessible Rich Internet Applications) technique, alongside various different behavioral changes, to ensure blind users visiting with screen-readers are able to read, comprehend, and enjoy the website’s functions. As soon as a user with a screen-reader enters your site, they immediately receive a prompt to enter the Screen-Reader Profile so they can browse and operate your site effectively. Here’s how our website covers some of the most important screen-reader requirements, alongside console screenshots of code examples:

    1. Screen-reader optimization: we run a background process that learns the website’s components from top to bottom, to ensure ongoing compliance even when updating the website. In this process, we provide screen-readers with meaningful data using the ARIA set of attributes. For example, we provide accurate form labels; descriptions for actionable icons (social media icons, search icons, cart icons, etc.); validation guidance for form inputs; element roles such as buttons, menus, modal dialogues (popups), and others. Additionally, the background process scans all the website’s images and provides an accurate and meaningful image-object-recognition-based description as an ALT (alternate text) tag for images that are not described. It will also extract texts that are embedded within the image, using an OCR (optical character recognition) technology. To turn on screen-reader adjustments at any time, users need only to press the Alt+1 keyboard combination. Screen-reader users also get automatic announcements to turn the Screen-reader mode on as soon as they enter the website.

      These adjustments are compatible with all popular screen readers, including JAWS and NVDA.

    2. Keyboard navigation optimization: The background process also adjusts the website’s HTML, and adds various behaviors using JavaScript code to make the website operable by the keyboard. This includes the ability to navigate the website using the Tab and Shift+Tab keys, operate dropdowns with the arrow keys, close them with Esc, trigger buttons and links using the Enter key, navigate between radio and checkbox elements using the arrow keys, and fill them in with the Spacebar or Enter key.Additionally, keyboard users will find quick-navigation and content-skip menus, available at any time by clicking Alt+1, or as the first elements of the site while navigating with the keyboard. The background process also handles triggered popups by moving the keyboard focus towards them as soon as they appear, and not allow the focus drift outside it.

      Users can also use shortcuts such as “M” (menus), “H” (headings), “F” (forms), “B” (buttons), and “G” (graphics) to jump to specific elements.

    Disability profiles supported in our website

    • Epilepsy Safe Mode: this profile enables people with epilepsy to use the website safely by eliminating the risk of seizures that result from flashing or blinking animations and risky color combinations.
    • Visually Impaired Mode: this mode adjusts the website for the convenience of users with visual impairments such as Degrading Eyesight, Tunnel Vision, Cataract, Glaucoma, and others.
    • Cognitive Disability Mode: this mode provides different assistive options to help users with cognitive impairments such as Dyslexia, Autism, CVA, and others, to focus on the essential elements of the website more easily.
    • ADHD Friendly Mode: this mode helps users with ADHD and Neurodevelopmental disorders to read, browse, and focus on the main website elements more easily while significantly reducing distractions.
    • Blindness Mode: this mode configures the website to be compatible with screen-readers such as JAWS, NVDA, VoiceOver, and TalkBack. A screen-reader is software for blind users that is installed on a computer and smartphone, and websites must be compatible with it.
    • Keyboard Navigation Profile (Motor-Impaired): this profile enables motor-impaired persons to operate the website using the keyboard Tab, Shift+Tab, and the Enter keys. Users can also use shortcuts such as “M” (menus), “H” (headings), “F” (forms), “B” (buttons), and “G” (graphics) to jump to specific elements.

    Additional UI, design, and readability adjustments

    1. Font adjustments – users, can increase and decrease its size, change its family (type), adjust the spacing, alignment, line height, and more.
    2. Color adjustments – users can select various color contrast profiles such as light, dark, inverted, and monochrome. Additionally, users can swap color schemes of titles, texts, and backgrounds, with over seven different coloring options.
    3. Animations – person with epilepsy can stop all running animations with the click of a button. Animations controlled by the interface include videos, GIFs, and CSS flashing transitions.
    4. Content highlighting – users can choose to emphasize important elements such as links and titles. They can also choose to highlight focused or hovered elements only.
    5. Audio muting – users with hearing devices may experience headaches or other issues due to automatic audio playing. This option lets users mute the entire website instantly.
    6. Cognitive disorders – we utilize a search engine that is linked to Wikipedia and Wiktionary, allowing people with cognitive disorders to decipher meanings of phrases, initials, slang, and others.
    7. Additional functions – we provide users the option to change cursor color and size, use a printing mode, enable a virtual keyboard, and many other functions.

    Browser and assistive technology compatibility

    We aim to support the widest array of browsers and assistive technologies as possible, so our users can choose the best fitting tools for them, with as few limitations as possible. Therefore, we have worked very hard to be able to support all major systems that comprise over 95% of the user market share including Google Chrome, Mozilla Firefox, Apple Safari, Opera and Microsoft Edge, JAWS and NVDA (screen readers).

    Notes, comments, and feedback

    Despite our very best efforts to allow anybody to adjust the website to their needs. There may still be pages or sections that are not fully accessible, are in the process of becoming accessible, or are lacking an adequate technological solution to make them accessible. Still, we are continually improving our accessibility, adding, updating and improving its options and features, and developing and adopting new technologies. All this is meant to reach the optimal level of accessibility, following technological advancements. For any assistance, please reach out to [email protected]

    MIL OSI Economics

  • MIL-OSI China: China releases national standards for emerging industries

    Source: People’s Republic of China – State Council News

    BEIJING, July 2 — China’s State Administration for Market Regulation on Wednesday said that it has released a series of national standards for emerging industries such as artificial intelligence (AI).

    Seven national standards have been released — covering AI, information technology and the Internet of Things — to provide technical support for the expansion of digital services and applications, the administration said.

    Another five national standards cover data centers, cybersecurity technologies, and systems and software engineering, supporting deeper integration and interconnection throughout the digital economy.

    The administration has released national standards on the safety of electric earthmoving machinery and the general requirements for battery-swap systems, improving the standards system for the electrification of traditional construction equipment and supporting the green transformation and upgrading of traditional industries, the administration said.

    It has also released a range of national standards covering such areas as elderly care and child care, transportation and energy, agriculture and rural development, and green and low-carbon development.

    MIL OSI China News

  • MIL-OSI Africa: Navigating Discrete Manufacturing in South Africa Through Digitalisation (By De Wet Joubert)

    By De Wet Joubert, Operations & Strategic Projects Director, RS South Africa (https://Africa.RSDelivers.com)

    South Africa’s discrete manufacturing sector, which includes industries such as automotive, electronics, rail, and aerospace, faces mounting pressure from global competition, fragmented supply chains, and outdated infrastructure. In this complex environment, digitalisation is emerging not as a future consideration, but as a critical lever for survival, resilience, and growth.

    Manufacturers are grappling with inconsistent supply chains, where limited visibility can halt entire operations. In discrete environments where the failure to procure even a single component can delay or derail entire production runs, real-time supply chain data is is no longer a luxury, it is a necessity.

    By integrating Industrial Internet of Things (IIoT) sensors, smart data loggers, and blockchain-enabled tracking platforms, manufacturers can transform disjointed supply chains into agile ecosystems. This transition can be supported with industrial communication modules, IIoT gateways, and advanced inventory management tools, all available through RS South Africa’s extensive digital platform.

    Modernising infrastructure doesn’t require a full-scale overhaul. Legacy equipment such as traditional PLCs and Human Machine Interfaces (HMIs) are not obstacles, but opportunities for optimisation. With retrofit solutions like programmable logic controllers (e.g. Siemens LOGO! 8, Allen-Bradley Micro800), signal converters, and edge computing devices, manufacturers can equip existing machinery with smart capabilities. These upgrades extend equipment lifecycles and build toward fully connected environments without requiring massive capital expenditure.

    Yet, alongside this technology imperative, there is an urgent need to address the African skills gap. National research shows that many African manufacturers remain at the early stages of Industry 4.0 readiness, with a particular deficit in digital and systems integration skills.

    To meaningfully close South Africa’s industrial skills gap, we must strengthen collaboration between higher education and industry. Universities are making great strides in incorporating real-world scenarios and advanced technologies into their programmes, but industry must also play a more active role in embedding its requirements at grassroots level. At RS South Africa, we support this through technical enablement and educational outreach, from providing Arduino and automation kits to funding student-led projects. Combined with STEM engagement and soft skills development, these efforts help bridge the gap between academic learning and industry expectations, equipping future engineers with the tools and confidence to lead.

    A cornerstone of effective digital transformation is real-time decision-making, which is enabled by robust Manufacturing Operations Management (MOM) systems as a framework. Its implementation can be supported by offering plant monitoring hardware, data acquisition systems, and panel PCs capable of displaying live dashboards. These systems streamline operations and reduce waste, while also enabling quality control, predictive maintenance, and compliance tracking.

    Digitalisation is also a powerful tool for building resilience and sustainability. With South Africa facing ongoing energy constraints and growing Environmental, Social, and Governance (ESG) expectations, manufacturers are under pressure to operate leaner and smarter. The role of predictive analytics and IIoT-enabled systems in monitoring energy usage, scheduling maintenance, and automating efficiency improvements needs to be emphasised. Products such as power meters, energy monitoring kits, smart relays, and sensor-driven HVAC systems support manufacturers in meeting these efficiency and compliance goals.

    One of the standout examples of local transformation is the Gibela rail manufacturing facility in Gauteng. Through automation, local supplier development, and workforce training, the site has achieved high levels of local content and productivity. Such projects are proof that digitalisation, combined with long-term investment in people and technology, can drive inclusive and competitive industrial growth. Components essential to such advanced environments include control panels, terminal blocks, protective relays, and advanced safety switches.

    For example, RS South Africa’s framework for enabling digital transformation in discrete manufacturing is grounded in five key pillars: retrofitting legacy equipment with intelligent controls; delivering experiential, industry-aligned training; integrating MOM systems for real-time operational insight; deploying IIoT solutions across plant and supply chains; and ensuring executive-level commitment to sustained innovation.

    In a time of global industrial acceleration, African manufacturers that fail to adopt digital tools risk being outpaced by more connected and agile competitors. Digitalisation is no longer optional, it is essential. It offers the tools to improve productivity, build resilience, drive sustainability, and unlock new economic opportunities for the country’s industrial sector. 

    By partnering with manufacturers and suppliers on this journey, we remain committed to shaping the future of African manufacturing, supporting a shift from isolated to integrated systems, from reactive to predictive operations, and from traditional labour-driven methods to data-led intelligence. 


    REFERENCES:
    Driving Digital Transformation of the Economy in South Africa 
    The Socio-economic Impact of Gibela 
    A Winning Strategy for South African Businesses (https://apo-opa.co/4l6oOnh)

    Distributed by APO Group on behalf of RS South Africa.

    PR Contact Person – RS South Africa: 
    Princess Tlou 
    Communications & Content Specialist  
    RS South Africa  
    Princess.Tlou@rsgroup.com 
    +27 11 691 9366 

    Media Contact Person – NGAGE:  
    Thobile Ndlovu 
    Senior PR Account Executive 
    thobile@ngage.co.za  
    +27 11 867 7763  

    Further information is available via these links: 

    RS South Africa (https://apo-opa.co/4le3jB6)
    RS Africa Exports (https://Africa.RSDelivers.com)
    DesignSpark (https://apo-opa.co/4l6wqWR)
    RS Group plc (https://apo-opa.co/45RSWye)

    About RS:
    RS is a global product and service solutions provider for industrial customers, enabling them to operate efficiently and sustainably.  

    We operate in 36 markets, stock over 800,000 industrial and specialist products and list an additional five million relevant for our industrial customers, sourced from over 2,500 suppliers. This extensive range supports our customers across the industrial lifecycle of designing, building, and maintaining equipment and operations.  

    We enhance their experience through a tailored service model, leveraging our efficient physical, digital and process infrastructure sustainably. We combine a technically led and digitally enabled approach with an exceptional team of experts; ultimately, it’s our people that make the difference. 

    Our purpose, making amazing happen for a better world, reflects our focus on delivering results for people planet and profit.  

    RS Group plc is listed on the London Stock Exchange with stock ticker RS1 and in the year ended 31 March 2024 reported revenue of £2,942 million. 

    MIL OSI Africa

  • MIL-OSI: Hut 8 Secures Five-Year Capacity Contracts with IESO for 310 MW of Power Generation Assets

    Source: GlobeNewswire (MIL-OSI)

    MIAMI, July 02, 2025 (GLOBE NEWSWIRE) — Hut 8 Corp. (Nasdaq | TSX: HUT) (“Hut 8” or the “Company”), an energy infrastructure platform integrating power, digital infrastructure, and compute at scale to fuel next-generation, energy-intensive use cases such as Bitcoin mining and high-performance computing, today announced that each of its four natural gas-fired power plants in Ontario (collectively, the “Portfolio”) has been awarded a five-year capacity contract with the Ontario Independent Electricity System Operator (“IESO”). The Portfolio is owned and operated by Far North Power Corp. (“Far North”), an entity formed by Hut 8 and Macquarie Equipment Finance Ltd. (“Macquarie”), a subsidiary of Macquarie Group Limited, a global financial services group.

    The contracts were awarded to Far North following successful bids submitted into the competitive IESO Medium-Term 2 (“MT2”) capacity auction and will commence on May 1, 2026. The contracted assets total 310 MW of nameplate capacity across four sites: Iroquois Falls, Kingston, Kapuskasing, and North Bay. The contracts include a weighted average capacity payment of approximately CAD $530 per MW-business day in Year 1 with partial inflation indexation that allows for potential increases over time.

    “Securing these contracts is a testament to the commercial and regulatory fluency of our power-native team,” said Asher Genoot, CEO of Hut 8. “It reflects our proactive approach to portfolio management and our focus on identifying value-accretive opportunities to maximize returns on our Power assets.”

    “This milestone for Far North is affirmation of the business and our relationship with Hut 8,” said Joshua Stevens, Managing Director in Macquarie Group’s Commodities and Global Markets business. “These contracts position the Far North power plants in Ontario for long-term relevance in a capacity-constrained power market, demonstrating the value we strive to bring as a capital provider.”

    Transaction Highlights

    • Creditworthy Offtaker: Government-backed counterparty rated AA3 (Positive) by Moody’s
    • Cash Flow Stabilization: Transition from short-term seasonal capacity agreements to fixed five-year contracts enhances revenue certainty and reduces earnings volatility
    • Upside Potential: Additional cash flow potential through energy sales into the Ontario market, where IESO projects 75% electricity demand growth by 2050 and a capacity shortfall of up to 5.8 GW by 2030, supporting increased reliance on existing dispatchable assets

    About Hut 8 

    Hut 8 Corp. is an energy infrastructure platform integrating power, digital infrastructure, and compute at scale to fuel next-generation, energy-intensive use cases such as Bitcoin mining and high-performance computing. We take a power-first, innovation-driven approach to developing, commercializing, and operating the critical infrastructure that underpins the breakthrough technologies of today and tomorrow. Our platform spans 1,020 megawatts of energy capacity under management across 15 sites in the United States and Canada: five Bitcoin mining, hosting, and Managed Services sites in Alberta, New York, and Texas, five high performance computing data centers in British Columbia and Ontario, four power generation assets in Ontario, and one non-operational site in Alberta. For more information, visit www.hut8.com and follow us on X at @Hut8Corp.

    Cautionary Note Regarding Forward–Looking Information

    This press release includes “forward-looking information” and “forward-looking statements” within the meaning of Canadian securities laws and United States securities laws, respectively (collectively, “forward-looking information”). All information, other than statements of historical facts, included in this press release that address activities, events, or developments that Hut 8 expects or anticipates will or may occur in the future, including statements relating to the commencement date of the MT2 contracts, the pricing and other terms of the MT2 contracts, the upside and additional cash flow potential through energy sales into the Ontario market anticipated, and the benefits to Hut 8 and Far North of the MT2 contracts, and other such matters is forward-looking information. Forward-looking information is often identified by the words “may”, “would”, “could”, “should”, “will”, “intend”, “plan”, “anticipate”, “allow”, “believe”, “estimate”, “expect”, “predict”, “can”, “might”, “potential”, “predict”, “is designed to”, “likely,” or similar expressions.

    Statements containing forward-looking information are not historical facts, but instead represent management’s expectations, estimates, and projections regarding future events based on certain material factors and assumptions at the time the statement was made. While considered reasonable by Hut 8 as of the date of this press release, such statements are subject to known and unknown risks, uncertainties, assumptions and other factors that may cause the actual results, level of activity, performance, or achievements to be materially different from those expressed or implied by such forward-looking information, including, but not limited to, failure of critical systems; geopolitical, social, economic, and other events and circumstances; competition from current and future competitors; risks related to power requirements; cybersecurity threats and breaches; hazards and operational risks; changes in leasing arrangements; Internet-related disruptions; dependence on key personnel; having a limited operating history; attracting and retaining customers; entering into new offerings or lines of business; price fluctuations and rapidly changing technologies; construction of new data centers, data center expansions, or data center redevelopment; predicting facility requirements; strategic alliances or joint ventures; operating and expanding internationally; failing to grow hashrate; purchasing miners; relying on third-party mining pool service providers; uncertainty in the development and acceptance of the Bitcoin network; Bitcoin halving events; competition from other methods of investing in Bitcoin; concentration of Bitcoin holdings; hedging transactions; potential liquidity constraints; legal, regulatory, governmental, and technological uncertainties; physical risks related to climate change; involvement in legal proceedings; trading volatility; and other risks described from time to time in Company’s filings with the U.S. Securities and Exchange Commission. In particular, see the Company’s recent and upcoming annual and quarterly reports and other continuous disclosure documents, which are available under the Company’s EDGAR profile at www.sec.gov and SEDAR+ profile at www.sedarplus.ca.

    Hut 8 Corp. Investor Relations
    Sue Ennis
    ir@hut8.com

    Hut 8 Corp. Public Relations
    Gautier Lemyze-Young
    media@hut8.com

    The MIL Network

  • MIL-OSI Russia: A party of sister cities of China and Russia was held in the border city of Fuyuan

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BEIJING, July 2 (Xinhua) — A party of sister cities of China and Russia was held in Fuyuan City, northeast China’s Heilongjiang Province on Tuesday, the Zhongxinwang Internet portal reported.

    The event aimed to promote Chinese-Russian cultural exchanges and cross-civilizational learning among representatives of the two countries.

    The party featured over 30 actors from Khabarovsk and other places in Russia, as well as over 50 actors from the Chinese side, including from the city of Fuyuan. They performed a total of 12 numbers, including the songs “Jasmine,” “Valenki,” and “Moscow Nights,” as well as the Russian folk dance “Kalinka.”

    The city of Fuyuan is separated from Russia by the rivers Usulijiang /Ussuri/ and Heilongjiang /Amur/ on the eastern and northern sides, respectively. -0-

    MIL OSI Russia News

  • MIL-OSI Africa: Judiciary set for full institutional independence

    Source: South Africa News Agency

    Judiciary set for full institutional independence

    The process of placing the country’s judiciary under “full institutional independence” is expected to be rolled out in the 2025/26 financial year.

    This was announced by Minister of Justice and Constitutional Development, Mmamoloko Kubayi, when she was presenting the budget vote of the Office of the Chief Justice (OCJ) in Parliament, on Tuesday afternoon.

    “[This] will enable the judiciary to be a fully-fledged Arm of the State. In line with the constitution, judicial governance and court administration will be placed under the authority of the Judiciary itself,” Kubayi said. 

    The proposed model will entail structural independence, which includes both financial and operational independence. With the vision to establish a single Judiciary, the administration of the Lower Courts, including the Magistrates Commission, will also be transferred the OCJ.

    Explaining the structure of the proposed model of the Judiciary, Kubayi highlighted that the Chief Justice will become the Executive Authority of the Office of the Chief Justice, while the Secretary-General will serve as the the accounting authority of the Judiciary. 

    “The OCJ will then be re-established outside the public service and be capacitated to appoint its staff in line with its own prescripts, human resource framework tailored to judicial operations and principles of independence,” the Minister explained.

    To carry out this process, the Minister announced that a task team comprising senior officials of the Department of Justice and Constitutional Development, Presidency, Office of the Chief Justice, National Treasury, Department of Public Service and Administration (DPSA), and the Department of Public Works and Infrastructure (DPWI), has been established to chart a way for the institutional independence of the Judiciary.

    The team has been given until August to present a progress report to Cabinet on the judiciary’s institutional independence.

    “In the end, as envisaged by the founders of our democracy, we want to create a single judiciary that is an equal Arm of the State,” Kubayi affirmed.

    Budget allocation

    The Minister told Parliament that the OCJ has been allocated a budget increase of some 5.5%, which will “go a long way in ensuring efficiency and effectiveness of the courts and the judiciary as a whole”.

    “The OCJ provides direct support to the Judiciary and Superior Courts to ensure that the Judicial Arm of the State functions optimally. As such, the OCJ has been allocated a budget of R2.7 billion for the 2025/2026 Financial Year, which it operationalises through its three Programmes, namely: Administration, Superior Court Services as well as Judicial Education and Support. This allocation also includes the direct allocation for the remuneration of Judges.

    “This represents a budget increase of just over 5.5% compared to the previous financial year, which will go a long way in ensuring efficiency and effectiveness of the courts and the judiciary as a whole. In his Budget Speech, Minister of Finance has also made an undertaking to, later this year, make funds available for strengthening capabilities in the Office of the Chief Justice,” the Minister said.

    She added that the modernisation of the court system remains a key priority to “improve access to justice”, highlighting the continued rollout of the Court Online system following its successful pilot in the Gauteng Division of the High Court.

    “Court Online provides a platform for Law Firms/Litigants to file documents to the Courts electronically (E-Filing) over the Internet from anywhere, and is now operational in the Gauteng, Western Cape, KwaZulu-Natal, Mpumalanga, and Limpopo divisions. Eastern Cape is currently being rolled out and will be completed by end of July 2025. 

    “It [the system] is also being progressively implemented at the Land Court, Labour Court, and Labour Appeal Court. The envisaged full implementation of Court Online will enhance access to quality justice for all and the effectiveness of the courts,” Kubayi said.

    Another priority is the implementation of the department’s Fraud Prevention and Anti-Corruption Policy and Strategy during 2025/2026 financial year.

    This in line with the OCJ’s zero tolerance stance on corruption and fraud.

    “This policy creates a mechanism for reporting anonymously within the department and through the National Anti-Corruption Hotline, amongst other things.

    “We can inform members that following the reports of corruption in the Mthatha High Court, the OCJ has commenced with Lifestyle Audits of all employees over and above the work that is done by law enforcement agencies. Furthermore 4 officials have been suspended in Pretoria High court following allegations fraud and corruption,” Kubayi said. – SAnews.gov.za

    NeoB

    MIL OSI Africa

  • MIL-OSI Economics: APEC Opens Scientist Exchange Program in Korea Sejong, Republic of Korea | 02 July 2025 APEC Policy Partnership on Science, Technology and Innovation APEC has kicked off a new exchange program to boost cross-border research, with Korea hosting the first cohort of scientists in Seoul this year.

    Source: APEC – Asia Pacific Economic Cooperation

    APEC has kicked off a new exchange program to boost cross-border research, with Korea hosting the first cohort of scientists in Seoul this year. The Scientist Invitation Program to Korea 2025 marks the first program under the APEC Scientist Exchange Initiative, a new regional effort to enhance scientific mobility and long-term collaboration.

    This is the first time APEC has launched a dedicated mobility track for scientists, signaling a significant step toward institutionalizing scientific exchange as part of the region’s broader agenda for inclusive innovation and sustainable growth.

    Funded and implemented this year by the Ministry of Science and ICT of the Republic of Korea, the program supports researchers from APEC member economies through structured training and joint research opportunities. It also offers streamlined visa application processes and fast-track entry and exit at Korean ports of entry.

    The launch comes at a time when economies are navigating post-pandemic recovery, an accelerating digital transformation and rising demand for interdisciplinary scientific talent. By investing in mobility and peer exchange, the program responds to calls for deeper regional cooperation in science and technology.

    “Capacity building and exchange programmes empower scientists to share knowledge, foster innovation and create solutions that transcend borders, driving global progress through shared mission collaborations via human-to-human exchanges,” said Hazami Habib, Vice Chair of the APEC Policy Partnership on Science, Technology and Innovation (PPSTI).

    “This could lead to not only enhanced connectivity but also significant impacts across the APEC region. The Scientist Invitation Program to Korea 2025 is a commendable initiative which stimulates further interest in collaborative research within the region,” Habib added.

    “Korea has emphasized the importance of innovation driven by cultivating science and technology talent,” said Sunghoon Hwang, Director General for International Cooperation at Korea’s Ministry of Science and ICT. “We hope that the Scientist Invitation Program will enable scientists from Korea and participating APEC members to build research networks and create scientific collaboration opportunities across the region, particularly with Korea.”

    The program offers two distinct pathways for participation. The first is a 10-day capacity-building track that includes mentoring, expert lectures and policy discussions to support future collaboration. The second is a 90-day research placement, where participants conduct joint research at leading Korean institutions. Eligible applicants must hold a PhD or a master’s degree with at least three years of relevant professional experience.

    The first session, focused on physics, ran from 26 May to 6 June in Seoul. It brought together 21 researchers and professors from Malaysia, Peru and Thailand, who engaged in lab visits, including the Center for Quantum Nanoscience at Ewha Womans University, and took part in cultural experiences that strengthened professional and personal ties.

    “This program will help me to have an international collaboration. I feel good, and this is a good opportunity for me,” said Dr Nuttawadee Intachai, a lecturer at Chiang Mai University in Thailand who participated in the session.

    The second session, focused on chemistry and involving scientists from Indonesia and the Philippines, concluded on 27 June. Upcoming sessions in earth sciences and life sciences, along with the first round of 90-day research placements, are set to begin in July.

    With up to 100 scientists expected to participate this year, the Scientist Invitation Program is laying the groundwork for a more connected, collaborative, and innovation-driven APEC region.

    The broader initiative also includes plans for an APEC Scientist Travel Card, modeled after the APEC Business Travel Card. Once developed, the card would streamline mobility for scientists attending conferences, seminars, or joint projects by facilitating visa-free or expedited entry. More information is available on the official program website.


    For media inquiries, please contact: [email protected]

    MIL OSI Economics

  • MIL-OSI New Zealand: New report: Uber shifted millions offshore, avoiding $56m in NZ tax – Workers First Union

    Source: Workers First Union

    A new report from the Centre for International Corporate Tax Accountability and Research (CICTAR), commissioned by Workers First Union, argues that multinational rideshare and delivery giant Uber appears to be shifting hundreds of millions in misclassified profits out of New Zealand, costing the country millions in tax revenue.
    The report examines Uber’s local and global business practices and approach to revenue and taxation, concluding that Uber’s practice of misclassification ext

    MIL OSI New Zealand News

  • MIL-Evening Report: Tonga cybersecurity attack wake-up call for Pacific, warns expert

    By Teuila Fuatai, RNZ Pacific senior journalist

    A Tongan cybersecurity expert says the country’s health data hack is a “wake-up call” for the whole region.

    Siosaia Vaipuna, a former director of Tonga’s cybersecurity agency, spoke to RNZ Pacific in the wake of the June 15 cyberattack on the country’s Health Ministry.

    Vaipuna said Tonga and other Pacific nations were vulnerable to data breaches due to the lack of awareness and cybersecurity systems in the region.

    “There’s increasing digital connectivity in the region, and we’re sort of . . . the newcomers to the internet,” he said.

    “I think the connectivity is moving faster than the online safety awareness activity [and] that makes not just Tonga, but the Pacific more vulnerable and targeted.”

    Since the data breach, the Tongan government has said “a small amount” of information from the attack was published online. This included confidential information, it said in a statement.

    Reporting on the attack has also attributed the breach to the group Inc Ransomware.

    Vaipuna said the group was well-known and had previously focused on targeting organisations in Europe and the US.

    New Zealand attack
    However, earlier this month, it targeted the Waiwhetū health organisation in Aotearoa New Zealand. That attack reportedly included the theft of patient consent forms and education and training data.

    “This type of criminal group usually employs a double-extortion tactic,” Vaipuna said.

    It could encrypt data and then demand money to decrypt, he said.

    “The other ransom is where they are demanding payment so that they don’t release the information that they hold to the public or sell it on to other cybercriminals.”

    In the current Tonga cyberattack, media reports say that Inc Ransomware wanted a ransom of US$1 million for the information it accessed. The Tongan government has said it has not paid anything.

    Vaipuna said more needed to be done to raise awareness in the region around cybersecurity and online safety systems, particularly among government departments.

    “I think this is a wake-up call. The cyberattacks are not just happening in movies or on the news or somewhere else, they are actually happening right on our doorstep and impacting on our people.

    Extra vigilance warning
    “And the right attention and resources should rightfully be allocated to the organisations and to teams that are tasked with dealing with cybersecurity matters.”

    The Tongan government has also warned people to be extra vigilant when online.

    It said more information accessed in the cyberattack may be published online, and that may include patient information and medical records.

    “Our biggest concern is for vulnerable groups of people who are most acutely impacted by information breaches of this kind,” the government said.

    It said that it would contact these people directly.

    The country’s ongoing response was also being aided by experts from Australia’s special cyberattack team.

    This article is republished under a community partnership agreement with RNZ.

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: Australians will soon need their age checked to log into online search tools – here’s why

    Source: The Conversation (Au and NZ) – By Lisa M. Given, Professor of Information Sciences & Director, Social Change Enabling Impact Platform, RMIT University

    Shutterstock

    By the end of this year, the experience of using search engines in Australia won’t be as simple as it has always been.

    That’s thanks to a new online safety code announced yesterday by Australia’s eSafety Commissioner, Julie Inman Grant. Among other measures, it will require all Australian users to provide assurance of their age when they sign into a search engine account.

    So what’s the new code about? How will it work in practice? And how exactly will it affect kids – and adults – in Australia who use search engines such as Google?

    What’s in the new code?

    The code orders providers of internet search-engine services such as Google and Microsoft (which owns Bing) to “implement appropriate age assurance measures for account holders” within six months.

    The code requires providers to review and mitigate “the risk that Australian children will access or be exposed to online pornography, high-impact violence material, and self-harm material” in search engine results.

    While the code does not define the age of a “child” as being under 18, or another age, a search engine must apply tools and settings that “at a minimum” filter out online pornography and extremely violent material from search results. Providers must also ensure advertising in these content areas is not served up in search results to child account holders.

    Currently, Google account holders must be at least 13 years old.

    The code creates several other rules for search engine providers that will impact everyone.

    For example, providers must “prevent autocomplete predictions that are sexually explicit or violent” and prominently display crisis-prevention information, such as helplines, in the results for queries relating to topics such as self-harm, suicide and eating disorders.

    Search engine providers will also have to blur some images in search results by default to reduce the risk of kids inadvertently accessing or being exposed to pornographic or violent material. And they will have to provide parental controls to limit or alter children’s access to adult material.

    On top of these measures, the code requires search-engine providers to report to eSafety, invest in safety and moderation teams, and engage with community organisations.

    The new code has been in development since July 2024. It was co-drafted by the Digital Industry Group Inc, an industry association representing tech companies including Google, Meta and Microsoft. A single breach could result in a search engine provider copping a fine of up to A$49.5 million.

    How will the code work in practice?

    The code does not spell out the measures to be used to assure someone’s age.

    They could including asking for government-issued ID or be similar to strategies currently being assessed for the Australian government’s under 16s social media ban, such as facial recognition technology.

    Yet, the government’s recent age assurance trials highlighted concerns about the accuracy of age estimation tools, despite claims of their overall effectiveness.

    Changing how people search

    Once implemented, age assurance requirements will likely change how people engage with search engines and other applications.

    Google is used by more than 90% of Australians and for more than just searching. The Google ecosystem includes Gmail, Google Drive, and Google Maps, providing seamless integration between search and other tools and tasks.

    Repeated age assurance requests could disrupt the seamlessness of content-sharing across devices that users now experience.

    Many people also opt to remain logged into their accounts on multiple devices, to quickly enable cross-device activities. This means within a family, users of multiple ages may access content on a single account, even when they don’t intend to do so.

    Will search engines need to change this functionality, to more regularly log users off their accounts, and reconfirm the account holder’s age? And how will the code affect features such as Google’s “incognito mode”, which is used for private searching?

    The code will apply to “any features integrated within the search functionality and the user interface” of the service, including results generated by artificial intelligence (AI). This means results generated by Google’s Gemini AI service fall under the code, alongside traditional search results.

    However, the code doesn’t apply to “standalone applications or tools that are not integrated within the internet search engine service”. This means that while a browser extension such as ChatGPT for Google may fall under the code, as an integrated search engine service, the standalone ChatGPT app could be excluded.

    This may make searching even more confusing for users, as many people may not understand the limitations of treating generative AI tools like search engines – but they are not.

    Will the code work?

    As with all age assurance checks, there may be ways people can get around these new search engine controls.

    For example, they may use VPNs to trick the system into believing they are outside of Australia (and therefore not subject to age assurance checks). Or, children may access content on older people’s accounts and devices.

    However, the code does preempt concerns that children might get around controls by simply not logging in to their accounts. And, the code’s insistence on reporting mechanisms means people of all ages will be able to report material and raise complaints about potential code violations.

    In this way, the code seems to reflect the government’s previously proposed (but now, paused) “digital duty of care” legislation, which aimed to hold technology companies to account for the content they provide.

    One crucial question remains: will the steps companies take to comply with the code meet Australians’ expectations for seamless, integrated search practices and personal privacy as they access information online?

    Lisa M. Given receives funding from the Australian Research Council. She is a Fellow of the Academy of the Social Sciences in Australia and the International Association for Information Science and Technology.

    ref. Australians will soon need their age checked to log into online search tools – here’s why – https://theconversation.com/australians-will-soon-need-their-age-checked-to-log-into-online-search-tools-heres-why-260199

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI Russia: Territory of reasonable decisions: how Muscovites are helped to improve their financial literacy

    Translation. Region: Russian Federal

    Source: Moscow Government – Government of Moscow –

    The popularity of educational projects on financial literacy is growing in the capital. Master classes, games, quizzes, film lectures and other interactive activities help city residents of all ages understand financial issues. The events are held by the capital’s Department of Finance together with the financial literacy center and partners.

    “We talk to Muscovites about finances where it is convenient for them and in a way that interests them: in schools and universities, libraries, festivals and parks. In 2024 alone, over 560 events of various formats were held in the capital. And this year there will be even more. It is important that Muscovites receive not only new knowledge, but also practical skills: they learn to handle money wisely and make thoughtful financial decisions,” she noted.

    Elena Zyabbarova, Minister of the Moscow Government, head of the capital’s Department of Finance.

    The meetings go beyond the usual spaces and are already becoming part of the urban environment. Thus, this summer, financial literacy days were held at the Northern and Southern river terminals – these are new city platforms for such conversations.

    Another major event is Festival of financial literacy and entrepreneurial culture in Moscow. It has been held since 2017 by the capital’s departments of finance, education and science, as well as the Bank of Russia, and has become a traditional city educational event for city residents of all ages who want to improve their level of financial literacy and learn the basics of entrepreneurship. Last year, the festival lasted a whole week and covered more than 200 sites, including the Moscow Center for Education Quality, schools, colleges, universities, Moscow Longevity Centers, My Work and My Career employment centers, libraries and the Digital Business Space. More than 500 thousand people took part in online and offline events. This coming autumn, the festival will return with a rich program.

    Classes to improve financial literacy are integrated into major events and festivals, including Biblionight, Night at the Museum, and Red Square. Most often, city residents are interested in how to avoid being scammed, invest, and plan their personal budget.

    Modern formats make such events more lively and exciting. In 2024, a financial stand-up and a VR simulator appeared, with the help of which you can practice your personal finance management skills.

    Financial Literacy in Libraries

    For more than two years now, thematic meetings have been held for residents of the capital near their homes. As part of the project “ABCs of Financial Literacy”, which covers all age groups, lectures, business games, film lectures and other events are organized in Moscow libraries.

    City residents discuss familiar life situations with experts, including how to plan a family budget, what to consider when applying for a loan, and how not to become a victim of fraudsters. Event announcements can be found on social networks and city library websites.

    Name for the project Muscovites themselves chose. More than 170 thousand people took part in the voting on the Active Citizen platform.

    Financial Literacy in Film

    One of the most original formats is film lectures in Moscow cinemas. This is an unusual way to involve city residents in managing their personal finances, even if they have not been seriously interested in this before.

    Together with experts, viewers watch famous Soviet and Russian films, including “Courier”, “Moneychangers”, “Russian Money”, “Domovoy”, “Family Budget”. And then they analyze the behavior of the characters from the point of view of financial literacy: what went wrong, and could it have been done differently?

    Soviet films raise topics that remain relevant today, they are simply presented through the prism of modern realities. For example, the film “Beware of the Car” raises questions about car insurance.

    The project is being implemented with the support of the Moskino cinema chain and Department of Culture of Moscow.

    Financial Literacy at Work

    The rhythm of the metropolis does not always leave time for self-education, so a project for financial education of employees of work collectives has appeared in Moscow. Organizations can invite experts to conduct lectures and master classes directly at workplaces – offline or online. All events are free, and the topic can be chosen depending on the request of employees.

    The focus is most often on cybersecurity, personal budget management, consumer protection, investment basics, taxation and lending. Listeners can choose from interactive lectures, master classes, financial quizzes and case studies.

    You can determine the topic, format and time of classes, as well as sign up for the waiting list by link.

    Financial Literacy for Children and Youth

    The upbringing of a financially literate person begins at an early age. Thematic classes and events with elements of financial literacy are organized by Department of Education and Science of the City of MoscowIn addition, children can take part in Olympiads and quizzes, quizzes and quests, meet with representatives of large Russian companies and attend lessons taught by representatives of the Federal Financial Monitoring Service (Rosfinmonitoring).

    The capital’s Department of Finance is implementing several projects on financial literacy for children and young people. Kindergartens regularly host events for preschoolers, schools host open lessons on financial and budget literacy, and children’s city camps host interactive classes during the holidays. Starting this year, they can be visited not only in the summer, but also in the spring and fall. Primary school students will learn about the origin of funds, rules for financial security and rational purchases, and will also create a model of their bank card and take part in a quiz.

    Experts can also be invited to colleges and universities. Heads of educational institutions choose what will really interest students, including quizzes, educational lectures or cartoons on financial topics. Questions related to budget planning, the history of money, financial security and lending remain popular with young people. You can send an application to link.

    Separate tracks for children’s audiences were also provided at citywide events. While adults listen to lectures on smart family budget planning, children can play the tactile game “Guess What?”, analyze the financial behavior of popular cartoon characters, or take part in the quiz “Secrets of Financial Security.”

    Financial Literacy for the Older Generation

    Older city residents actively participate in educational events with experts, which take place in Moscow longevity centers, libraries and other venues, as well as at major festivals. Muscovites of the “silver” age learn how to make purchases on the Internet, protect personal data and avoid spontaneous spending.

    Experts also talk about aspects of inheritance law in Russia, forms of wills and the specifics of drafting them. It is important that listeners can get answers to their questions on the spot and analyze their personal financial situations.

    In addition, the Moscow Longevity project offers regular classes on financial and legal literacy. The course programs are designed to take into account the interests of the older audience. You can find out more at the Moscow Longevity Centers and on the portal Mos.ru.

    Financial Literacy for People with Disabilities

    Special attention is paid to financial education of citizens with disabilities. Muscovites with visual impairments will be able to attend lectures at the Russian State Library for the Blind and listen to educational programs recorded by the Department of Finance on Internet radio. People with hearing impairments have the opportunity to access educational videos with sign language interpretation. This allows us to cover all segments of the population and create a truly inclusive educational environment.

    Tax deductions and banking products: Moscow launches financial literacy project for the visually impairedMoscow projects to improve financial literacy are recognized as the best in Russia

    Financial literacy in new formats

    Technology is an important component of educational formats. In 2024, an updated version of the financial checkup was presented – an online test that helps assess your knowledge. More than 4.3 thousand people took it. This can be done at any time by linkBy answering a few questions, everyone will find out their level of financial literacy and receive personal recommendations and links to useful materials for further self-education.

    The VR simulator is no less popular. Participants get the opportunity to immerse themselves in a virtual space, where they try themselves in the role of a tax consultant or bank employee and make important decisions on loans and tax deductions. You can practice budget management skills at the events of the Department of Finance.

    Economically active Muscovites have a high level of financial literacy

    Financial Literacy Online

    Those who prefer to study remotely can also easily find the necessary information. Useful materials, event announcements and links are published on the portal “Open Budget of the City of Moscow” and in the same name telegram channel.

    Budget literacy

    Budget literacy projects are also being developed in Moscow. One example is the “Budget for Citizens” competition. The participants are mainly schoolchildren and students. They make guidebooks, draw comics, brochures and posters, develop educational websites, create educational videos and cartoons, and come up with business, board and computer games.

    The organizers analyze the competition entries and try to take into account useful suggestions. The most interesting ideas are implemented in educational projects. Department of FinanceThe works of the winners of the capital competition are also highly valued at the federal level.

    Get the latest news quickly official telegram channelthe city of Moscow.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    Please Note; This Information is Raw Content Directly from the Information Source. It is access to What the Source Is Stating and Does Not Reflect

    https: //vv.mos.ru/nevs/ite/156131073/

    MIL OSI Russia News

  • MIL-OSI Australia: Reducing waste in the APS: Sustainable Device Management Guide now live.

    Source:

    As part of the Australian Government’s commitment to sustainable digital transformation, the DTA has released a new Sustainable Device Management (SDM) Guide. The guide will support agencies to manage their end-of-life ICT equipment in a secure, ethical and environmentally responsible way. 

    MIL OSI News

  • MIL-OSI USA: SPC Severe Thunderstorm Watch 482

    Source: US National Oceanic and Atmospheric Administration

    Note:  The expiration time in the watch graphic is amended if the watch is replaced, cancelled or extended.Note: Click for Watch Status Reports.
    SEL2

    URGENT – IMMEDIATE BROADCAST REQUESTED
    Severe Thunderstorm Watch Number 482
    NWS Storm Prediction Center Norman OK
    405 PM MDT Tue Jul 1 2025

    The NWS Storm Prediction Center has issued a

    * Severe Thunderstorm Watch for portions of
    Western Nebraska
    Western South Dakota
    Northeast Wyoming

    * Effective this Tuesday afternoon and evening from 405 PM until
    1100 PM MDT.

    * Primary threats include…
    Scattered large hail and isolated very large hail events to 2
    inches in diameter possible
    Isolated damaging wind gusts to 70 mph possible

    SUMMARY…Isolated to widely scattered severe storm development,
    potentially including a couple of high-based supercells, is expected
    regionally through early evening, with the possibility that a
    loosely organized cluster could evolve later this evening.

    The severe thunderstorm watch area is approximately along and 70
    statute miles east and west of a line from 65 miles north of Rapid
    City SD to 50 miles east of Sidney NE. For a complete depiction of
    the watch see the associated watch outline update (WOUS64 KWNS
    WOU2).

    PRECAUTIONARY/PREPAREDNESS ACTIONS…

    REMEMBER…A Severe Thunderstorm Watch means conditions are
    favorable for severe thunderstorms in and close to the watch area.
    Persons in these areas should be on the lookout for threatening
    weather conditions and listen for later statements and possible
    warnings. Severe thunderstorms can and occasionally do produce
    tornadoes.

    &&

    OTHER WATCH INFORMATION…CONTINUE…WW 481…

    AVIATION…A few severe thunderstorms with hail surface and aloft to
    2 inches. Extreme turbulence and surface wind gusts to 60 knots. A
    few cumulonimbi with maximum tops to 550. Mean storm motion vector
    29025.

    …Guyer

    SEL2

    URGENT – IMMEDIATE BROADCAST REQUESTED
    Severe Thunderstorm Watch Number 482
    NWS Storm Prediction Center Norman OK
    405 PM MDT Tue Jul 1 2025

    The NWS Storm Prediction Center has issued a

    * Severe Thunderstorm Watch for portions of
    Western Nebraska
    Western South Dakota
    Northeast Wyoming

    * Effective this Tuesday afternoon and evening from 405 PM until
    1100 PM MDT.

    * Primary threats include…
    Scattered large hail and isolated very large hail events to 2
    inches in diameter possible
    Isolated damaging wind gusts to 70 mph possible

    SUMMARY…Isolated to widely scattered severe storm development,
    potentially including a couple of high-based supercells, is expected
    regionally through early evening, with the possibility that a
    loosely organized cluster could evolve later this evening.

    The severe thunderstorm watch area is approximately along and 70
    statute miles east and west of a line from 65 miles north of Rapid
    City SD to 50 miles east of Sidney NE. For a complete depiction of
    the watch see the associated watch outline update (WOUS64 KWNS
    WOU2).

    PRECAUTIONARY/PREPAREDNESS ACTIONS…

    REMEMBER…A Severe Thunderstorm Watch means conditions are
    favorable for severe thunderstorms in and close to the watch area.
    Persons in these areas should be on the lookout for threatening
    weather conditions and listen for later statements and possible
    warnings. Severe thunderstorms can and occasionally do produce
    tornadoes.

    &&

    OTHER WATCH INFORMATION…CONTINUE…WW 481…

    AVIATION…A few severe thunderstorms with hail surface and aloft to
    2 inches. Extreme turbulence and surface wind gusts to 60 knots. A
    few cumulonimbi with maximum tops to 550. Mean storm motion vector
    29025.

    …Guyer

    Note: The Aviation Watch (SAW) product is an approximation to the watch area. The actual watch is depicted by the shaded areas.
    SAW2
    WW 482 SEVERE TSTM NE SD WY 012205Z – 020500Z
    AXIS..70 STATUTE MILES EAST AND WEST OF LINE..
    65N RAP/RAPID CITY SD/ – 50E SNY/SIDNEY NE/
    ..AVIATION COORDS.. 60NM E/W /57W DPR – 43E SNY/
    HAIL SURFACE AND ALOFT..2 INCHES. WIND GUSTS..60 KNOTS.
    MAX TOPS TO 550. MEAN STORM MOTION VECTOR 29025.

    LAT…LON 44980162 41090068 41090336 44980448

    THIS IS AN APPROXIMATION TO THE WATCH AREA. FOR A
    COMPLETE DEPICTION OF THE WATCH SEE WOUS64 KWNS
    FOR WOU2.

    Watch 482 Status Report Message has not been issued yet.

    Note:  Click for Complete Product Text.Tornadoes

    Probability of 2 or more tornadoes

    Low (10%)

    Probability of 1 or more strong (EF2-EF5) tornadoes

    Low ( 65 knots

    Low (10%)

    Hail

    Probability of 10 or more severe hail events

    Mod (50%)

    Probability of 1 or more hailstones > 2 inches

    Mod (30%)

    Combined Severe Hail/Wind

    Probability of 6 or more combined severe hail/wind events

    High (70%)

    For each watch, probabilities for particular events inside the watch (listed above in each table) are determined by the issuing forecaster. The “Low” category contains probability values ranging from less than 2% to 20% (EF2-EF5 tornadoes), less than 5% to 20% (all other probabilities), “Moderate” from 30% to 60%, and “High” from 70% to greater than 95%. High values are bolded and lighter in color to provide awareness of an increased threat for a particular event.

    MIL OSI USA News

  • MIL-OSI Submissions: The hidden cost of convenience: How your data pulls in hundreds of billions of dollars for app and social media companies

    Source: The Conversation – USA – By Kassem Fawaz, Associate Professor of Electrical and Computer Engineering, University of Wisconsin-Madison

    Many apps and social media platforms collect detailed information about you as you use them, and sometimes even when you’re not using them. Malte Mueller/fStop via Getty images

    You wake up in the morning and, first thing, you open your weather app. You close that pesky ad that opens first and check the forecast. You like your weather app, which shows hourly weather forecasts for your location. And the app is free!

    But do you know why it’s free? Look at the app’s privacy settings. You help keep it free by allowing it to collect your information, including:

    • What devices you use and their IP and Media Access Control addresses.
    • Information you provide when signing up, such as your name, email address and home address.
    • App settings, such as whether you choose Celsius or Fahrenheit.
    • Your interactions with the app, including what content you view and what ads you click.
    • Inferences based on your interactions with the app.
    • Your location at a given time, including, depending on your settings, continuous tracking.
    • What websites or apps that you interact with after you use the weather app.
    • Information you give to ad vendors.
    • Information gleaned by analytics vendors that analyze and optimize the app.

    This type of data collection is standard fare. The app company can use this to customize ads and content. The more customized and personalized an ad is, the more money it generates for the app owner. The owner might also sell your data to other companies.

    Many apps, including the weather channel app, send you targeted advertising and sell your personal data by default.
    Jack West, CC BY-ND

    You might also check a social media account like Instagram. The subtle price that you pay is, again, your data. Many “free” mobile apps gather information about you as you interact with them.

    As an associate professor of electrical and computer engineering and a doctoral student in computer science, we follow the ways software collects information about people. Your data allows companies to learn about your habits and exploit them.

    It’s no secret that social media and mobile applications collect information about you. Meta’s business model depends on it. The company, which operates Facebook, Instagram and WhatsApp, is worth US$1.48 trillion. Just under 98% of its profits come from advertising, which leverages user data from more than 7 billion monthly users.




    Read more:
    How Internet of Things devices affect your privacy – even when they’re not yours


    What your data is worth

    Before mobile phones gained apps and social media became ubiquitous, companies conducted large-scale demographic surveys to assess how well a product performed and to get information about the best places to sell it. They used the information to create coarsely targeted ads that they placed on billboards, print ads and TV spots.

    Mobile apps and social media platforms now let companies gather much more fine-grained information about people at a lower cost. Through apps and social media, people willingly trade personal information for convenience. In 2007 – a year after the introduction of targeted ads – Facebook made over $153 million, triple the previous year’s revenue. In the past 17 years, that number has increased by more than 1,000 times.

    Five ways to leave your data

    App and social media companies collect your data in many ways. Meta is a representative case. The company’s privacy policy highlights five ways it gathers your data:

    First, it collects the profile information you fill in. Second, it collects the actions you take on its social media platforms. Third, it collects the people you follow and friend. Fourth, it keeps track of each phone, tablet and computer you use to access its platforms. And fifth, it collects information about how you interact with apps that corporate partners connect to its platforms. Many apps and social media platforms follow similar privacy practices.

    Your data and activity

    When you create an account on an app or social media platform, you provide the company that owns it with information like your age, birth date, identified sex, location and workplace. In the early years of Facebook, selling profile information to advertisers was that company’s main source of revenue. This information is valuable because it allows advertisers to target specific demographics like age, identified gender and location.

    And once you start using an app or social media platform, the company behind it can collect data about how you use the app or social media. Social media keeps you engaged as you interact with other people’s posts by liking, commenting or sharing them. Meanwhile, the social media company gains information about what content you view and how you communicate with other people.

    Advertisers can find out how much time you spent reading a Facebook post or that you spent a few more seconds on a particular TikTok video. This activity information tells advertisers about your interests. Modern algorithms can quickly pick up subtleties and automatically change the content to engage you in a sponsored post, a targeted advertisement or general content.

    Your devices and applications

    Companies can also note what devices, including mobile phones, tablets and computers, you use to access their apps and social media platforms. This shows advertisers your brand loyalty, how old your devices are and how much they’re worth.

    Because mobile devices travel with you, they have access to information about where you’re going, what you’re doing and who you’re near. In a lawsuit against Kochava Inc., the Federal Trade Commission called out the company for selling customer geolocation data in August 2022, shortly after Roe v Wade was overruled. The company’s customers, including people who had abortions after the ruling was overturned, often didn’t know that data tracking their movements was being collected, according to the commission. The FTC alleged that the data could be used to identify households.

    Kochava has denied the FTC’s allegations.

    Information that apps can gain from your mobile devices includes anything you have given an app permission to have, such as your location, who you have in your contact list or photos in your gallery.

    If you give an app permission to see where you are while the app is running, for instance, the platform can access your location anytime the app is running. Providing access to contacts may provide an app with the phone numbers, names and emails of all the people that you know.

    Cross-application data collection

    Companies can also gain information about what you do across different apps by acquiring information collected by other apps and platforms.

    The settings on an Android phone show that Meta uses information it collects about you to target ads it shows you in its apps – and also in other apps and on other platforms – by default.
    Jack West, CC BY-ND

    This is common with social media companies. This allows companies to, for example, show you ads based on what you like or recently looked at on other apps. If you’ve searched for something on Amazon and then noticed an ad for it on Instagram, it’s probably because Amazon shared that information with Instagram.

    This combined data collection has made targeted advertising so accurate that people have reported that they feel like their devices are listening to them.

    Companies, including Google, Meta, X, TikTok and Snapchat, can build detailed user profiles based on collected information from all the apps and social media platforms you use. They use the profiles to show you ads and posts that match your interests to keep you engaged. They also sell the profile information to advertisers.

    Meanwhile, researchers have found that Meta and Yandex, a Russian search engine, have overcome controls in mobile operating system software that ordinarily keep people’s web-browsing data anonymous. Each company puts code on its webpages that used local IPs to pass a person’s browsing history, which is supposed to remain private, to mobile apps installed on that person’s phone, de-anonymizing the data. Yandex has been conducting this tracking since 2017, while Meta began in September 2024, according to the researchers.

    What you can do about it

    If you use apps that collect your data in some way, including those that give you directions, track your workouts or help you contact someone, or if you use social media platforms, your privacy is at risk.

    Aside from entirely abandoning modern technology, there are several steps you can take to limit access – at least in part – to your private information.

    Read the privacy policy of each app or social media platform you use. Although privacy policy documents can be long, tedious and sometimes hard to read, they explain how social media platforms collect, process, store and share your data.

    Check a policy by making sure it can answer three questions: what data does the app collect, how does it collect the data, and what is the data used for. If you can’t answer all three questions by reading the policy, or if any of the answers don’t sit well with you, consider skipping the app until there’s a change in its data practices.

    Remove unnecessary permissions from mobile apps to limit the amount of information that applications can gather from you.

    Be aware of the privacy settings that might be offered by the apps or social media platforms you use, including any setting that allows your personal data to affect your experience or shares information about you with other users or applications.

    These privacy settings can give you some control. We recommend that you disable “off-app activity” and “personalization” settings. “Off-app activity” allows an app to record which other apps are installed on your phone and what you do on them. Personalization settings allow an app to use your data to tailor what it shows you, including advertisements.

    Review and update these settings regularly because permissions sometimes change when apps or your phone update. App updates may also add new features that can collect your data. Phone updates may also give apps new ways to collect your data or add new ways to preserve your privacy.

    Use private browser windows or reputable virtual private networks software, commonly referred to as VPNs, when using apps that connect to the internet and social media platforms. Private browsers don’t store any account information, which limits the information that can be collected. VPNs change the IP address of your machine so that apps and platforms can’t discover your location.

    Finally, ask yourself whether you really need every app that’s on your phone. And when using social media, consider how much information you want to reveal about yourself in liking and commenting on posts, sharing updates about your life, revealing locations you visited and following celebrities you like.


    This article is part of a series on data privacy that explores who collects your data, what and how they collect, who sells and buys your data, what they all do with it, and what you can do about it.

    Kassem Fawaz receives funding from the National Science Foundation. In the past, his research group has received unrestricted gifts from Meta and Google.

    Jack West does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. The hidden cost of convenience: How your data pulls in hundreds of billions of dollars for app and social media companies – https://theconversation.com/the-hidden-cost-of-convenience-how-your-data-pulls-in-hundreds-of-billions-of-dollars-for-app-and-social-media-companies-251698

    MIL OSI

  • MIL-OSI: Provident Financial Services, Inc. Schedules Second Quarter Earnings Conference Call

    Source: GlobeNewswire (MIL-OSI)

    ISELIN, N.J., July 01, 2025 (GLOBE NEWSWIRE) — Provident Financial Services, Inc. (NYSE: PFS) announced that it expects to release financial results for the quarter ended June 30, 2025 on Thursday, July 24, 2025 at 8:00am. A copy of the earnings release will be immediately available on the Company’s website, www.Provident.Bank, by going to Investor Relations and clicking on Press Releases.

    Representatives of the Company will hold a conference call for investors on July 24, 2025 at 2:00 p.m. (ET) to discuss the Company’s second quarter financial results. Information about the conference call is as follows:

    PARTICIPANT DIAL-IN NUMBERS:
    North America Toll-Free: (888) 412-4131
    International Toll: +1(646) 960-0134
    Conference ID 3610756
       

    Internet access to the call will be available (listen only) at www.Provident.Bank by going to Investor Relations and clicking on Webcast.

    A replay of the call will be available beginning at 12:00 noon (ET) on July 24, 2025 until 11:59 p.m. (ET) on August 7, 2025.

    Toll Free Dial in Number: 1-800-770-2030
    Toll Dial in Number: 1-609-800-9909
    Playback ID: 3610756 followed by # key
       

    The call will also be archived on the Company’s website for a period of one year.

    Provident Financial Services, Inc. is the holding company for Provident Bank. As of March 31, 2025, the Company reported assets of $24.22 billion. The Bank currently operates a network of full-service branches throughout New Jersey, eastern Pennsylvania, and Orange, Queens, and Nassau Counties, New York. The Bank also provides fiduciary and wealth management services through its wholly owned subsidiary, Beacon Trust Company, and insurance services through its wholly owned subsidiary, Provident Protection Plus, Inc.

    SOURCE: Provident Financial Services, Inc.
    CONTACT: Investor Relations, 1-732-590-9300
    Web Site: http://www.Provident.Bank

    The MIL Network

  • MIL-OSI Security: Weiser Man Sentenced to 14 Years in Federal Prison for Possessing Child Sex Abuse Material

    Source: Office of United States Attorneys

    BOISE – Cody Michael Howells, 35, of Weiser, was sentenced to 168 months in federal prison for possessing child sexual abuse material, Acting U.S. Attorney Justin Whatcott announced today.

    According to court records, the investigation began when the Idaho Internet Crimes Against Children Task Force (“ICAC”) received CyberTip reports from an online social media platform. A CyberTip is a report submitted to the National Center for Missing and Exploited Children (NCMEC). NCMEC gathers leads and tips regarding suspected online crimes against children and forwards them to the appropriate law enforcement agencies. ICAC determined that numerous files of child sexual abuse material had been uploaded to an account, later identified as belonging to Howells. ICAC subsequently executed a federal search warrant at Howell’s residence in Weiser. During an interview, Howells admitted to viewing child sexual abuse material. ICAC located additional files of child sexual abuse material on Howell’s cellphone. At the time, Howells was on parole for Lewd Conduct with a Minor Under 16.

    Senior U.S. District Judge B. Lynn Winmill also sentenced Howells to lifetime supervised release following his prison sentence and ordered him to pay $30,000 in restitution to victims in the images he possessed. Howells will be required to register as a sex offender as a result of the conviction.

    Acting U.S. Attorney Whatcott commended the work of the Idaho ICAC Task Force, the Washington County Sheriff’s Office, the Rupert Police Department, and the Weiser Police Department, which led to the charge. Assistant U.S. Attorney David G. Robins prosecuted the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice.  As part of Project Safe Childhood, the U.S. Attorney’s Office for the District of Idaho and the Idaho Attorney General’s Office partner to marshal federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    ###

    MIL Security OSI