Latest news with #PII
Yahoo
5 days ago
- Business
- Yahoo
1 Cash-Producing Stock to Own for Decades and 2 to Ignore
A company that generates cash isn't automatically a winner. Some businesses stockpile cash but fail to reinvest wisely, limiting their ability to expand. Cash flow is valuable, but it's not everything - StockStory helps you identify the companies that truly put it to work. Keeping that in mind, here is one cash-producing company that excels at turning cash into shareholder value and two that may struggle to keep up. Trailing 12-Month Free Cash Flow Margin: 3.3% Founded in 1954, Polaris (NYSE:PII) designs and manufactures high-performance off-road vehicles, snowmobiles, and motorcycles. Why Do We Avoid PII? Annual sales declines of 11.6% for the past two years show its products and services struggled to connect with the market Earnings per share fell by 17.2% annually over the last five years while its revenue was flat, showing each sale was less profitable Diminishing returns on capital suggest its earlier profit pools are drying up Polaris is trading at $40.62 per share, or 27x forward P/E. Check out our free in-depth research report to learn more about why PII doesn't pass our bar. Trailing 12-Month Free Cash Flow Margin: 26.4% Spun off from Hewlett-Packard in 2014, Keysight (NYSE:KEYS) offers electronic measurement products for use in various sectors. Why Do We Think KEYS Will Underperform? Demand cratered as it couldn't win new orders over the past two years, leading to an average 3.3% decline in its backlog Falling earnings per share over the last two years has some investors worried as stock prices ultimately follow EPS over the long term Shrinking returns on capital suggest that increasing competition is eating into the company's profitability At $158.19 per share, Keysight trades at 21.7x forward P/E. Dive into our free research report to see why there are better opportunities than KEYS. Trailing 12-Month Free Cash Flow Margin: 10.5% Developing sirens that warned of air raid attacks or fallout during the Cold War, Federal Signal (NYSE:FSS) provides safety and emergency equipment for government agencies, municipalities, and industrial companies. Why Are We Backing FSS? Sales pipeline is in good shape as its backlog averaged 10.8% growth over the past two years Operating profits and efficiency rose over the last five years as it benefited from some fixed cost leverage Earnings growth has trumped its peers over the last two years as its EPS has compounded at 28.7% annually Federal Signal's stock price of $99.64 implies a valuation ratio of 26x forward P/E. Is now the right time to buy? Find out in our full research report, it's free. Market indices reached historic highs following Donald Trump's presidential victory in November 2024, but the outlook for 2025 is clouded by new trade policies that could impact business confidence and growth. While this has caused many investors to adopt a "fearful" wait-and-see approach, we're leaning into our best ideas that can grow regardless of the political or macroeconomic climate. Take advantage of Mr. Market by checking out our Top 5 Strong Momentum Stocks for this week. This is a curated list of our High Quality stocks that have generated a market-beating return of 183% over the last five years (as of March 31st 2025). Stocks that made our list in 2020 include now familiar names such as Nvidia (+1,545% between March 2020 and March 2025) as well as under-the-radar businesses like the once-small-cap company Comfort Systems (+782% five-year return). Find your next big winner with StockStory today for free. Find your next big winner with StockStory today. Find your next big winner with StockStory today Sign in to access your portfolio


Time of India
09-06-2025
- Entertainment
- Time of India
Marriage for persons with disabilities: A choice, not a financial incentive
If somebody writes an epitaph to Sangita, it should be headlined 'Happy Soul'. Nothing fazes her. No challenge is too big. A fan of James Bond's 'never say die' spirit, just like him she thrives on adrenalin rush as she fields every curveball life throws her way. Sangita is a person with multiple disabilities. A patient of Spinal Muscular Atrophy (SMA), Sangita is a wheelchair user and hearing aids user. For the past 10 years, she has been whizzing past life in a wheelchair, notching professional milestones. She believes nothing is insurmountable, certainly not limitations imposed by disabilities. Sangita has three decades of experience in the media, content and communications industry across verticals and industries. She has been associated with the development and disability sector and featured in the first Directory of Development Journalists in India published by the PII. She has also functioned as a media representative of the Rehabilitation Council of India and has conducted various S&A programmes for bureaucrats. Sangita is the founder of Ashtavakra Accessibility Solutions Private Limited, a social enterprise dedicated to the inclusion of the disabled. LESS ... MORE Before saying 'Yes,' I had one clear condition: the decision had to be free from pity or mere romantic idealism. Love alone wasn't enough—it had to be grounded in the profound understanding of my progressive condition and everything it could mean. Twenty-two years later, I'm grateful I held firm. Today, my marriage is rock-solid because it's built on true companionship, unwavering support, and deep mutual understanding—not monetary incentives or societal pressures. However, that is not the story for the majority of people with disabilities. In India, where marriage is often seen as a societal milestone, persons with disabilities (PwDs) face unique challenges in finding partners due to pervasive ableism and societal stigma. To address this, several state governments have introduced marriage incentive schemes aimed at encouraging the union of PwDs. I find this deeply concerning. Currently, 19 Indian states offer such incentives, and charitable organisations regularly conduct mass marriages providing one-time financial support. Although well-intentioned, these practices risk commodifying marriage, mirroring dowry systems, and fostering relationships that may falter once incentives run out. While these schemes may seem beneficial on the surface, a deeper examination reveals complexities that question their efficacy and ethical implications. The landscape of marriage incentive schemes Firstly, there is no conformity in the various marriage incentive schemes. For instance, Kerala provides a one-time assistance of Rs 30,000 to disabled women or daughters of disabled parents, while Haryana offers Rs 51,000 if both spouses are disabled. These schemes differ not only in monetary value but also in eligibility criteria, reflecting a lack of uniformity and clear objectives. Further, these incentives inadvertently mirror the dowry system by attaching monetary value to the marriage of PwDs. Critics argue that this commodification can perpetuate harmful stereotypes, suggesting that financial compensation is necessary to make a PwD 'marriageable.' Another strong criticism centres on the disability model these schemes are based on. Clearly, marriage incentive schemes fall within the charity model of disability, which views PwDs as dependents requiring aid, rather than as individuals with rights and autonomy. This perspective undermines the principles of the Rights of Persons with Disabilities Act, 2016, which emphasises equality and non-discrimination. Marriage in the absence of enabling infrastructure that promotes quality education, employment, independence of PwDs, is at best compounding the very challenges that they struggle with—especially when both partners are persons with disabilities. They will continue to face the same systemic barriers that hinder their social inclusion. Hence, without tackling these root causes, financial incentives do little to address the issues and offer only a superficial and temporary solution. Diverse perspectives within the community Even within the disability community, the opinions are diametrically opposite. Some individuals, particularly in rural areas, view the incentives as supportive measures that acknowledge their desire for companionship and family life, as highlighted in a recent article by a disability rights advocate ( However, urban disability activists often critique these schemes for perpetuating dependency and failing to promote genuine empowerment. In my view, while it is important to acknowledge the desire for companionship and family life, a marriage based on financial incentive runs the risk of denying both unless backed by individual understanding of what a union between/with PwDs entails. Marriages involving disability—particularly between disabled and non-disabled partners—require enduring empathy, patience, and commitment. Disabled women, in particular, often face heightened vulnerability in marriage, needing genuine, ongoing emotional and physical support from partners and families. This vulnerability is further amplified by patriarchal expectations that often place unrealistic burdens on disabled women while denying them autonomy and respect. The problem with mass marriages Mass marriages organised by charitable organisations raise additional concerns. These events may appear supportive on the surface, but they often bypass critical aspects such as informed consent, compatibility, and long-term agency. When conducted at scale with financial incentives, they risk reducing the institution of marriage to a symbolic gesture rather than a meaningful, informed choice. The optics of charity further dilute the focus on autonomy and dignity. Towards empowerment and autonomy True empowerment demands systemic change, better infrastructure, accessible education and employment, and comprehensive pre-marital counselling to ensure informed choices. Instead of adopting the charity model towards marriage of PwDs, the governments must focus on bringing about the much-needed 360-degree pivot in their approach towards PwDs. Firstly, invest in accessible infrastructure and services to enable independent living, rather than making charitable doles under various incentives. Secondly, promote education and employment that could create opportunities for PwDs, leading to financial independence and self-sufficiency. Thirdly, implement nationwide awareness campaigns to combat stigma and promote inclusivity. We need to challenge societal attitudes, not endorse them by showing PwDs as needy and a charity case, even in the marriage market. Fourthly, provide comprehensive support to marriageable PwDs through counselling, legal aid, and healthcare services that respect the autonomy and dignity of PwDs. Respect PwDs' autonomy & choice Whether marriages are made in heaven or not, for their survival and success on earth—especially given the rollercoaster of life that people with disabilities perforce have—they must be grounded in something far more tangible: companionship, mutual understanding, and a lifelong commitment that transcends financial transactions. While marriage incentive schemes for PwDs may be well-intentioned, they risk reinforcing problematic narratives and failing to address the deeper issues of inequality and exclusion. Empowerment should not come in the form of financial inducements for marriage but through systemic changes that uphold the rights, choices, and dignity of persons with disabilities. Marriage, like any personal decision, should be a matter of choice, free from coercion or financial persuasion. For PwDs too, marriage must remain a deeply personal, informed decision—never reduced to financial incentives or societal expectations. Based on secondary research Facebook Twitter Linkedin Email Disclaimer Views expressed above are the author's own.


New Straits Times
06-06-2025
- New Straits Times
MCMC: Mobile data used only for anonymised national statistics
CYBERJAYA: The Malaysian Communications and Multimedia Commission (MCMC) has clarified that no Personally Identifiable Information (PII) from telcos has been accessed, processed or disclosed. In a statement posted on social media today, the commission said mobile phone data (MPD) collected under its programme is fully anonymised and used solely to produce official statistics to support policymaking in the Information and Communication Technology (ICT) and tourism sectors. It said the data is limited to aggregate metrics such as active broadband subscriptions and domestic visitor trends by region. "Telcos either process the anonymised data internally or submit it to MCMC without any information that could identify individual users. In both cases, no individual subscriber can be identified," it said. MCMC added that the data programme was developed in line with international best practices, in collaboration with the International Telecommunication Union (ITU) and the United Nations Committee of Experts on Big Data and Data Science. The initiative reportedly underwent two years of engagement with mobile network operators (MNOs), government ministries and statisticians. A national workshop held in September 2024 included participation from the Department of Statistics Malaysia (DOSM), the International Trade and Industry Ministry (Miti), the Tourism, Arts and Culture Ministry (Motac), and major MNOs including CelcomDigi, Maxis, TM Tech, U Mobile and YTL. MCMC said the use of MPD as a new source of national statistics is part of the government's strategy to enhance the quality and timeliness of data for policy and planning. The commission noted that similar models are already in place in countries such as Indonesia and Brazil, where anonymised telecommunications data is used to improve statistical systems while safeguarding user privacy. Earlier today, the South China Morning Post reported that two industry sources confirmed the government had, in April, sent a letter to telcos directing them to submit detailed records of calls and internet use for the first quarter of 2025. The letter, issued under the government's Mobile Phone Data project, reportedly warned that non-compliance would be an offence under the Communications and Multimedia Act 1998 (CMA).
Yahoo
28-05-2025
- Business
- Yahoo
Wildix Rolls out Fully Embedded Agentic AI for UCaaS that's Modular, Codeless, Autonomous
Real-time, codeless automation with shared memory, native privacy controls and proven ROI, now live in 1,000+ environments TALLINN, Estonia, May 28, 2025--(BUSINESS WIRE)--Wildix, a global Unified Communications as a Service (UCaaS) provider, today announced the launch of the industry's first fully embedded agentic AI layer for UCaaS, now operational across more than 1,000 customer environments. Designed to adapt to how each organization operates, the AI layer automates interactions across voice, chat, SMS, WhatsApp and web, without relying on static scripts or bolted-on bots. The system interprets language, references past exchanges and applies contextual logic to guide each decision. Modular by design, the system can be tailored to specific workflows, whether it's routing calls in public services, handling appointments in healthcare or managing surges in retail. Configuration happens through a visual no-code studio, making deployment fast, repeatable and scalable for partners and customers alike. According to Gartner, agentic AI will autonomously resolve 80% of customer service issues by 2029, leading to a 30% reduction in operational costs. "Wildix's launch of its agentic AI solution that works across all types of communication channels is very timely," said Oru Mohiuddin, Research Director, IDC. "Businesses are increasingly looking to automate workflows that can help to drive customer satisfaction and efficiency simultaneously. Solutions that can help to achieve this will resonate closely with customer demand." Wildix brings that future forward, with contextual automation, shared memory, and no-code design that deliver ROI from day one. It reduces overflow, speeds up response and proves its value from the start. "Organizations are under pressure to accelerate service, reduce costs and improve responsiveness," said Dimitri Osler, co-founder and CIO, Wildix. "This release is designed to meet those expectations immediately. Our AI doesn't just assist. It executes, adapts and integrates natively into existing workflows with zero disruption." Core Capabilities That Support Business Outcomes Wildix AI automates the high-frequency, high-friction tasks that slow teams down — scheduling, call routing, follow-ups and FAQs, while maintaining full context across every interaction. Key capabilities include: Codeless AI studio to launch expert workflows in minutes Multilingual support in 13+ languages, across voice and chat Sentiment-aware escalation to route complex or emotional cases to humans Native integrations with Salesforce, HubSpot, WhatsApp, and Omnichannel deployment, including browser, mobile, headsets and embeddable widgets Persistent memory across agents, channels and sessions GDPR-aligned architecture with transcription engines separated from LLMs to protect PII The system is available across the full Wildix suite, including x-bees for sales-oriented teams, x-hoppers for retail and Collaboration 7 for business operations. Real-world automation, measurable impact Wildix partners work directly with customers to define metrics before deployment, from first-contact resolution to overflow cost reduction, and configure automation to deliver visible, immediate value. In the United Kingdom, a growing network of telehealth providers implemented the AI system across more than 40 dental practices to address peak-hour call volumes. Today, the AI receptionist handles scheduling, reminders and insurance queries, reducing third-party overflow costs and increasing billable appointment time. "This is one of the cleanest ROIs we've ever delivered," said Stewart Donnor, Global Head of Sales Engineering, Wildix. "It cuts overflow costs, increases billable time and it gives clinics their front desk back." In Spain, the Valencian Football Federation uses Wildix AI to absorb seasonal surges in fan inquiries, including ticketing, schedules and match-day updates. The system handles tens of thousands of contacts during peak events, without requiring year-round staffing. "We saw the demand was going to grow before it became a problem," said Jaime Mestre, IT Manager, Valencia Football Federation. "With Wildix and the support of our Wildix Leader Network Gold Partner, we've created a system that understands our members, responds instantly and gives our staff time to focus on what really matters." Scalable AI Architecture for Long-Term Growth Wildix has spent years building AI features designed for real business use cases, from live call summaries and multilingual support to headset-triggered in-store alerts and sales coaching. This latest release consolidates those innovations into a single automation layer that can scale without disrupting daily operations or introducing third-party complexity. Upcoming enhancements include unified scoring to assess both AI and human agent performance, CRM-driven coaching with real-time next-best-action prompts, native WhatsApp automation with live handoff and expanded language support. To explore Wildix's AI-powered solutions, visit About Wildix Wildix is a global provider of Unified Communications as a Service (UCaaS) solutions, designed to simplify business collaboration and drive measurable performance. With fully integrated telephony, video, messaging, and AI capabilities, Wildix helps organizations connect securely and effectively, whether in-office, hybrid, or frontline. Its vertical retail platform, x-hoppers, delivers instant, hands-free communication to staff on the move, improving customer experience and operational speed. View source version on Contacts Media Contact: Deliah MathieuVP of Global Communications, Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data


Geeky Gadgets
27-05-2025
- Business
- Geeky Gadgets
Choose Secure Data Erasure Over Factory Reset for Mac
Apple Silicon or Intel-based Macs have an option to be reset to factory mode. Once the Mac device is reset, all the applications and saved personal data are formatted, and the device is restored to factory settings. This hard reset frees up storage space, deleting stored data and thereby increasing its processing speed. Several areas on the disk store data such as user credentials, built-in app data, backup information, etc., that are inaccessible to the user, operating system, BIOS, or UEFI. Existing in different forms, Host Protected Area (HPA), Disk Configuration Overlay (DCO), or Accessible Max Address (AMA), these hidden disk areas mainly contain disk utilities for the device to function smoothly. It is of utmost importance that data from these disk zones be erased to prevent data leakage. However, a factory reset is incapable of fulfilling this purpose. The Hidden Risks: Recoverable Data Post Factory Reset A factory reset only removes the pointers to the file system, removing only access to the data and not the data itself. In most cases, the actual contents of the Mac drive still reside on the Mac, which is recoverable using freely available Mac data recovery software or through forensic in-lab services. The data traces left behind after a factory reset can comprise Personally Identifiable Information (PII), Protected Health Information (PHI), credit card information, etc., which, if leaked, can ruin decades of reputation for a business in seconds, and this is just the beginning. Data protection laws and regulations like EU-GDPR, HIPAA, CCPA, GLBA, etc., require businesses to erase personal data collected for processing after the retention period is over, the purpose has been served, or the individual has requested the removal of their data. Data removal has to be permanent beyond recovery from the entire Mac device, including inaccessible disk zones HPA, DCO, and other remapped sectors. Contrary to popular belief, a factory reset does not meet the secure erase requirements such as those needed by NIST 800-88, DoD 5220.22 M, or other regulatory guidelines. On Mac devices with SSDs, data is stored in memory blocks that also have the TRIM command enabled. While TRIM helps in optimizing the performance of SSDs, however, there is no way to ensure that the data has been permanently erased, as the TRIM command can be disabled by individuals, either intentionally or due to system configurations. Further, laws also mandate a proof of data destruction to be maintained by the organization in the form of a report or certificate of destruction. A software-based data erasure tool is highly recommended if the Mac devices are in a functional state and the business intends to reuse them; however, if the device is non-functional and cannot be repaired, then the device must be destroyed using physical destruction methods. The Real World Impact: When Factory Reset Fails Consider an organization that has no policies or mechanisms in place for data destruction. For reusing, repurposing, reselling, or donating their end-of-life devices, including Mac devices, the organization performs a factory reset on all the functional devices. These reset devices are either handed over to their new owners or discarded. Since the business-critical information still remains on these devices, the threat to data privacy lingers continually. The sensitive information can be recovered from all these devices using forensic tools or data recovery software, which can then be misused or can result in a data breach episode. The 2016 Morgan Stanley data breach case is one such example where confidential data such as social security numbers, passports, and credit card information, was recovered from decommissioned IT assets. These IT assets were not only not properly erased but also were resold to a third party without sanitization verification. This unauthorized access to personal data brought the organization penalties close to USD 100 million imposed by authorities, including the Office of the Comptroller of the Currency (OCC) and Securities and Exchange Commission (SEC), over a span of more than 5 years. One data breach caused Morgan Stanley operational downtime, penalties, and loss of customer trust. The Secure Solution: Software-Based Data Erasure Organizations must devise data destruction policies, including data retention guidelines, to ensure secure erasure is performed periodically without any scope for gaps in the process. The policies should also include guidelines on how data of varying sensitivity should be securely erased from different Mac devices and what tool should be used to perform secure data erasure. For example, the Mac devices containing data related to intellectual property or financial information that is critical must be sanitized using a certified data erasure tool like BitRaser before Mac devices are reallocated or refurbished. A software-based data erasure tool applies international data erasure algorithms like NIST 800-88 Clear, NIST 800-88 Purge, and DoD 5220.22 M (3 pass). It permanently erases data from all devices, including Mac's with erasure from inaccessible hidden disk areas. It also generates immutable erasure reports and a certificate of data destruction, which assist in complying with the governing data protection laws and regulations. Resetting Isn't Enough, Erasure is Essential Organizations have always been proactive in adapting to modern-day technology to gain more profits, gain a competitive edge, and establish their brand as progressive. However, many lag in assimilating this strategy when it comes to policy implementation in terms of data destruction. The risk of a data breach creeps over every business today, whether it is a startup or an enterprise. According to IBM's Cost of a Data Breach Report 2024, an average data breach costs USD 4.88 million. This cost is 10% higher than that mentioned in the IBM 2023 report. Clearly, there is a dire need for organizations to prevent data breaches by including secure data erasure as one of their cybersecurity strategies. To prevent this risk from turning into a tragic event, businesses must leverage data erasure programs to destroy data on their Mac devices, comply with the requirements of data protection laws, and build trust with their customers. Compliance is no longer optional, and a factory reset is not compliant. Filed Under: Apple, Guides, Laptops Latest Geeky Gadgets Deals Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.