Category: 3. Business

  • LG Electronics Expects Lower 3Q Operating Profit

    LG Electronics Expects Lower 3Q Operating Profit

    By Kwanwoo Jun

    LG Electronics' third-quarter operating profit likely fell 8.4%, but the forecast still beat market consensus thanks to its affiliates' solid performance despite tough business conditions.

    The South Korean consumer-electronics giant said in a preliminary earnings report Monday that its operating profit will likely come in at 688.90 billion won, equivalent to $481.9 million, for the July-September period, compared with 751.90 billion a year earlier.

    The projected earnings were above a FactSet-compiled consensus estimate of 618.79 billion won.

    Revenue is expected to have fallen 1.4% from a year earlier to 21.875 trillion won, LG Electronics said, also beating analysts' estimate in the FactSet survey.

    Despite challenges from higher U.S. tariffs and a delayed recovery in global demand, its home-appliance segment remained competitive and continued to be the market leader, while its vehicle-component segment achieved record-high profitability, the company said.

    LG Electronics said that its media and entertainment segment, which includes its television business, faced higher marketing costs amid intensifying global competition.

    The company, which recently raised $1.3 billion by selling a 15% stake in its Indian unit, LG Electronics India, in an initial public offering, said it expects the proceeds to provide significant funding to accelerate business structure improvements and future growth initiatives. The Indian unit is set to list Tuesday.

    The company is scheduled to release its full quarterly results later this month.

    Write to Kwanwoo Jun at kwanwoo.jun@wsj.com

    (END) Dow Jones Newswires

    October 12, 2025 22:43 ET (02:43 GMT)

    Copyright (c) 2025 Dow Jones & Company, Inc.

    Continue Reading

  • Artificial intelligence enhances safety and precision in pediatric anesthesia

    Artificial intelligence enhances safety and precision in pediatric anesthesia

    Artificial intelligence (AI) could soon help anesthesiologists keep children safer in the operating room and improve their recovery with better pain management, suggests a systematic review presented at the ANESTHESIOLOGY® 2025 annual meeting.

    Providing anesthesia care for children is especially challenging because their anatomy can vary dramatically, even among patients of the same age. The researchers found AI performed better than standard methods for determining the appropriate size and placement of breathing tubes, monitoring oxygen levels and assessing postoperative pain. AI consistently: improved the prediction, mitigation and management of complications; enhanced clinical accuracy and decision-making; and allowed anesthesiologists to intervene sooner when complications occurred.

    Think of AI as the co-pilot, while the anesthesiologist makes all the final decisions. AI can continuously analyze thousands of data points in real time and learn patterns from past cases, spotting subtle changes sooner and helping tailor decisions to each child’s unique anatomy. However, it does not replace the anesthesiologist’s training and expertise; it simply adds another layer of safety and support.”


    Aditya Shah, B.S., lead author of the study and medical student at Central Michigan University College of Medicine, Saginaw

    The researchers analyzed 10 studies and found that AI tools were more effective than current screening/analysis methods. Although AI tools for pediatric anesthesia are still in the research stage, their significant benefits make it likely they will be incorporated into practice in the near future, Shah said.

    The studies show AI can improve:

    • Oxygen level monitoring: Anesthesiologists use monitors to track a child’s oxygen level in the blood, but alarms don’t go off until the levels are already dangerously low. The anesthesiologist must act immediately and only has seconds to prevent serious harm. Researchers trained AI systems to continuously analyze second-by-second data of oxygen levels from anesthesia machines based on more than 13,000 surgeries. The most efficient AI model analyzes the child’s breathing, oxygen and heart data in real time, spotting tiny changes that humans can’t detect. It can warn anesthesiologists up to 60 seconds before the standard alarm system sounds. This gives anesthesiologists an extra minute to adjust the ventilator, clear secretions or fix the airway problem before a child’s oxygen level becomes dangerously low, potentially preventing heart or brain injury. The difference is like putting out a fire as soon as it starts versus being warned when smoke first appears, Shah said.
    • Postoperative pain assessment: Pain is challenging to assess in children, who often can’t communicate how they feel. Current methods are about 85%-88% accurate, including the FLACC scale (Face, Legs, Activity, Cry, Consolability), a 0-10 point tool that health care professionals use to assess pain in children based on what they observe, and the Wong-Baker scale, which shows a series of faces from smiling to crying that the child points to. Researchers recorded more than 1,000 pain assessments in 149 toddlers – such as crying, agitation, guarding of the throat and facial expressions – and trained an AI system to recognize which clues were most important for detecting pain. The AI tool measured children’s pain with 95% accuracy.
    • Accuracy of breathing tube size and placement: The size of breathing tubes and depth of placement in the throat are critical to avoiding serious complications, including injuring the airway lining and providing inadequate levels of oxygen. Current formulas use the child’s age or height, but children’s anatomy can vary quite a bit. Various studies show AI can make this process more accurate. In a study of 37,000 children, machine-learning models (a type of AI) used patient characteristics to predict breathing tube size and depth far more accurately, reducing errors by 40%-50%.

    “AI can offer personalized, real-time decision support to anesthesiologists, potentially reducing complications and outcomes in children, where precision is especially critical,” said Patrick Fakhoury, B.S., co-author and a medical student at Central Michigan University College of Medicine. “For parents, the real value of AI is peace of mind.”

    Source:

    American Society of Anesthesiologists

    Continue Reading

  • Jefferies sees limited impact from First Brands' bankruptcy – Reuters

    1. Jefferies sees limited impact from First Brands’ bankruptcy  Reuters
    2. Behind the Collapse of an Auto-Parts Giant: $2 Billion Hole and Mysterious CEO  The Wall Street Journal
    3. Auto Stocks in a Spin as First Brands, Tricolor Worry Investors  Bloomberg.com
    4. Jefferies Provides Letter from Its CEO and President Regarding Point Bonita Capital and First Brands Group  The AI Journal
    5. Echoes of the ‘Subprime Crisis’? Credit funds under Wall Street investment banks explode, with peers like Morgan Stanley beginning to withdraw investments.  富途牛牛

    Continue Reading

  • Endocrinology of the Testis. and Male Reproduction | SpringerLink [Internet]. [cited 2025 Jul 23]. Available from: https://link.springer.com/https://doi.org/10.1007/978-3-319-44441-3

  • Jahangir M, Nazari M, Babakhanzadeh E, Manshadi SD. Where do obesity and male infertility collide? BMC Med Genom. 2024;17:128.

    Article 

    Google Scholar 

  • Zhang Y, Song J-Y, Sun Z-G. Exploring the impact of environmental factors on male reproductive health through epigenetics. Reprod Toxicol. 2025;132:108832.

    Article 
    PubMed 

    Google Scholar 

  • Bracke A, Peeters K, Punjabi U, Hoogewijs D, Dewilde S. A search for molecular mechanisms underlying male idiopathic infertility. Reprod Biomed Online. 2018;36:327–39.

    Article 
    PubMed 

    Google Scholar 

  • Heck AL, Handa RJ. Sex differences in the hypothalamic–pituitary–adrenal axis’ response to stress: an important role for gonadal hormones. Neuropsychopharmacol. 2019;44:45–58.

    Article 

    Google Scholar 

  • Sheng JA, Bales NJ, Myers SA, Bautista AI, Roueinfar M, Hale TM, et al. The Hypothalamic-Pituitary-Adrenal axis: Development, programming actions of Hormones, and Maternal-Fetal interactions. Front Behav Neurosci. 2020;14:601939.

    Article 
    PubMed 

    Google Scholar 

  • Rebello RJ, Oing C, Knudsen KE, Loeb S, Johnson DC, Reiter RE, et al. Prostate cancer. Nat Rev Dis Primers. 2021;7:9.

    Article 
    PubMed 

    Google Scholar 

  • Ng KL. The Etiology of Prostate Cancer. In: Bott SR, Ng KL, editors. Prostate Cancer [Internet]. Brisbane (AU): Exon Publications; 2021 [cited 2025 Jul 14]. Available from: http://www.ncbi.nlm.nih.gov/books/NBK571322/

  • Fichtner A, Nettersheim D, Bremmer F. Pathogenesis and pathobiology of testicular germ cell tumours: a view from a developmental biological perspective with guidelines for pathological diagnostics. Histopathology. 2024;85:701–15.

    Article 
    PubMed 

    Google Scholar 

  • Fichtner A, Richter A, Filmar S, Gaisa NT, Schweyer S, Reis H, et al. The detection of isochromosome i(12p) in malignant germ cell tumours and tumours with somatic malignant transformation by the use of quantitative real-time polymerase chain reaction. Histopathology. 2021;78:593–606.

    Article 
    PubMed 

    Google Scholar 

  • Stuppia L, Franzago M, Ballerini P, Gatta V, Antonucci I. Epigenetics and male reproduction: the consequences of paternal lifestyle on fertility, embryo development, and children lifetime health. Clin Epigenetics. 2015;7:120.

    Article 
    PubMed 
    PubMed Central 

    Google Scholar 

  • Van Cauwenbergh O, Di Serafino A, Tytgat J, Soubry A. Transgenerational epigenetic effects from male exposure to endocrine-disrupting compounds: a systematic review on research in mammals. Clin Epigenetics. 2020;12:65.

    Article 
    PubMed 
    PubMed Central 

    Google Scholar 

  • Gentile G, De Stefano F, Sorrentino C, D’Angiolo R, Lauretta C, Giovannelli P, et al. Androgens as the old age stick in skeletal muscle. Cell Communication Signal. 2025;23:167.

    Article 

    Google Scholar 

  • Li J, Shen L, Wang K, Wu S, Wang Y, Pan Y, et al. Biogenesis of stress granules and their role in the regulation of stress-induced male reproduction disorders. Cell Communication Signal. 2025;23:84.

    Article 

    Google Scholar 

  • Löf C, Sultana N, Goel N, Heron S, Wahlström G, House A, et al. ANO7 expression in the prostate modulates mitochondrial function and lipid metabolism. Cell Communication Signal. 2025;23:71.

    Article 

    Google Scholar 

  • Zhang Y, Zhang C, Feng R, Meng T, Peng W, Song J, et al. CXCR4 regulates macrophage M1 polarization by altering Glycolysis to promote prostate fibrosis. Cell Communication Signal. 2024;22:456.

    Article 

    Google Scholar 

  • Li Z, Wang Y, Yu Z, Luo Y, Zhao Y, Xue E, et al. UHRF1 phase separation mediates stable inheritance of DNA methylation and promotes the proliferation of prostate cancer cells. Cell Communication Signal. 2025;23:297.

    Article 

    Google Scholar 

  • Feng Y, Sun J, Kang X, Wang Y, Liu K, Wang W, et al. NASP implication in the androgen receptor associated with castration resistance in prostate cancer. Cell Communication Signal. 2025;23:331.

    Article 

    Google Scholar 

  • Zhong C, Wang J, Peng H, Lu J, Long Z, Lin Z, et al. GG-NER’s role in androgen receptor signaling inhibitor response for advanced prostate cancer. Cell Communication Signal. 2024;22:600.

    Article 

    Google Scholar 

  • Shokry D, Khan MW, Powell C, Johnson S, Rennels BC, Boyd RI, et al. Refractory testicular germ cell tumors are highly sensitive to the targeting of polycomb pathway demethylases KDM6A and KDM6B. Cell Commun Signal. 2024;22:528.

    Article 
    PubMed 
    PubMed Central 

    Google Scholar 

  • Tavares NT, Lourenço C, Constâncio V, Fernandes-Pontes F, Fonseca D, Silva-Santos R, et al. MicroRNA-371–373 cluster extracellular vesicle-based communication in testicular germ cell tumors. Cell Communication Signal. 2025;23:252.

    Article 

    Google Scholar 

  • Cui Y, Zhou X, Zhang J, Fang B, Ge J, Tang H, et al. Exploiting potential molecular compounds for treating testicular seminoma by targeting immune related genes. Cell Communication Signal. 2024;22:560.

    Article 

    Google Scholar 

  • Tabibian M, Moghaddam FS, Motevaseli E, Ghafouri-Fard S. Targeting mRNA-coding genes in prostate cancer using CRISPR/Cas9 technology with a special focus on androgen receptor signaling. Cell Communication Signal. 2024;22:504.

    Article 

    Google Scholar 

  • Zhao H, Li J, Xiao Z, Xiao Y. Dose-dependent role of AMH and AMHR2 signaling in male differentiation and regulation of sex determination in Spotted knifejaw (Oplegnathus punctatus) with X1X1X2X2/X1X2Y chromosome system. Cell Communication Signal. 2025;23:59.

    Article 

    Google Scholar 

  • Zhai W, Tian H, Liang X, Wu Y, Wen J, Liu Z, et al. Androgen blockage impairs proliferation and function of Sertoli cells via Wee1 and Lfng. Cell Communication Signal. 2024;22:498.

    Article 

    Google Scholar 

  • Gao T, Liu Y, Li J, Zhang Y, Wu B. Function of Manchette and intra-manchette transport in spermatogenesis and male fertility. Cell Communication Signal. 2025;23:250.

    Article 

    Google Scholar 

  • Zhou H, Xu Z, Jiang C, Wu Q, Zhang C, Liu Z, et al. Ionizing radiation-induced disruption of Rela-Bclaf1-spliceosome regulatory axis in primary spermatocytes causing spermatogenesis dysfunction. Cell Communication Signal. 2025;23:58.

    Article 

    Google Scholar 

  • Agnieszka M-M, Magdalena B-N, Mariola S, Andrzej C. PRDX5 and PRDX6 translocation and oligomerization in bull sperm: a response to cryopreservation-induced oxidative stress. Cell Communication Signal. 2025;23:15.

    Article 

    Google Scholar 

  • Graffeo ML, Nguyen J, Parast FY, Dunleavy JEM, Korneev D, Yang H, et al. A novel mechanism of sperm midpiece epididymal maturation and the role of CCDC112 in sperm midpiece formation and Establishing an optimal flagella waveform. Cell Communication Signal. 2025;23:319.

    Article 

    Google Scholar 

  • Hu T, Tang X, Ruan T, Long S, Liu G, Ma J, et al. IQUB mutation induces radial spoke 1 deficiency causing asthenozoospermia with normal sperm morphology in humans and mice. Cell Communication Signal. 2025;23:41.

    Article 

    Google Scholar 

  • Al-Ali H, Baig A, Alkhanjari RR, Murtaza ZF, Alhajeri MM, Elbahrawi R, et al. Septins as key players in spermatogenesis, fertilisation and pre-implantation embryogenic cytoplasmic dynamics. Cell Communication Signal. 2024;22:523.

    Article 

    Google Scholar 

  • Errico A, Ambrosini G, Vinco S, Bottani E, Dalla Pozza E, Marroncelli N, et al. In vitro effect of hCG on Cryptorchid patients’ gubernacular cells: a predictive model for adjuvant personalized therapy. Cell Communication Signal. 2025;23:19.

    Article 

    Google Scholar 

Continue Reading

  • MENA startups face a cybersecurity wake-up call

    MENA startups face a cybersecurity wake-up call

    An article by Dmitry Marinov, CTO of ANY.RUN, a UAE-based cybersecurity company

    As the MENA startup ecosystem matures, cybersecurity has shifted from a back-office concern to a boardroom topic. With investors now demanding tangible proof of security controls—and not just compliance claims—founders must treat cybersecurity as a marker of operational maturity, not an afterthought.

    In 2025, MENA startups face mounting pressure to align with both domestic compliance regimes (such as the UAE’s TDRA/NCA and KSA’s SAMA/NCA frameworks) and global investor expectations tied to ISO 27001, SOC2, and GDPR-like standards.

    What’s new is that these aren’t just policies on paper — they now demand proof of practice. Startups are expected to demonstrate:

    • Detonation of malware in sandbox environments
    • Retention of threat activity logs for more than 30 days
    • Mapping detections to MITRE ATT&CK and maintaining incident response workflows that go beyond email warnings

    If just three years ago regional VCs rarely asked about security during due diligence, today investors and auditors increasingly treat this data as evidence of operational maturity, not just hygiene.

    Still, the gap between what investors expect and what is happening on the ground has never been wider. In my incident response work across the MENA region, I’ve seen the same pattern repeatedly: startups with world-class products running on completely flat networks — all servers, workstations, and development environments on the same subnet with limited internal firewalls, no log retention beyond a week, and employees opening suspicious files directly on their laptops.

    Becoming “security-capable” doesn’t require a fortune or a full SOC team. But it does require understanding what’s actually hitting startups in this region.

    The most common types of attacks against startups in MENA

    Startups everywhere face a standard set of cyber risks — phishing, ransomware, business email compromise (BEC) scams, and supply chain attacks. While Western attackers often aim to exfiltrate data at scale, many MENA-targeted campaigns are financially driven, delivering loaders like PrivateLoader or SmokeLoader as access points for ransomware groups.

    Startups in the UAE and Saudi Arabia face disproportionately high volumes of commodity malware, rarely seen in ecosystems like those in the EU and the US. The region exhibits a distinctive flavour and intensity in specific vectors:

    • Phishing remains the dominant attack vector, particularly credential harvesting via impersonated Microsoft login pages, fake invoice links, and HTML file lures embedded in ZIP archives.
    • Stealer malware and droppers are designed for low observability — running in 64-bit and ARM environments, evading UAC prompts, and avoiding overt persistence.
    • Business Email Compromise (BEC) has experienced a sharp rise (29 % increase in attack volume just in the UAE), often involving pretexting and internal impersonation to reroute payments or extract sensitive documents.
    • Malicious documents are declining in volume but persist in campaigns that use archive containers or disguise themselves as training files.

    Common root causes and security blind spots in early-stage teams

    The biggest misconception among startups is that security is a “scale problem”—something to worry about after product-market fit. In reality, security debt compounds like technical debt, and the longer you wait, the more it costs—in engineering time, customer trust, and valuation risk.

    Attackers don’t wait for Series B funding. We’ve seen phishing kits and loaders hit within days of a product launch, especially in regions like MENA where sandboxing and logging practices are still maturing.

    Investors are also asking earlier: by the time you’re raising your first institutional round, funds in Abu Dhabi or Riyadh are already requesting red-team reports and sandbox logs. The tipping point isn’t a breach — it’s your first customer. From the moment you handle user data or payment flows, you’re a target, whether you have 50 users or 50,000.

    Across early-stage startups, the same weaknesses surface repeatedly:

    1. Flat network setups: dev, staging, and production often run in the same network with overly broad access rights. A breach in one system can quickly spread to the rest.
    2. Weak credential practices: even with MFA, teams often reuse passwords or share admin accounts, making it easy for attackers to move laterally once they get in.
    3. Blind trust in endpoint security: many assume antivirus or EDR will block everything. In reality, most malware is designed to bypass these tools, especially when delivered via ZIP files or public CDNs.
    4. Phishing and social engineering: startups underestimate how targeted phishing has become, with lures mimicking tax portals, banks, or government sites. Attackers also go after founders or CFOs via LinkedIn or WhatsApp using convincing pretexts.
    5. Third-party dependencies: early-stage teams rely heavily on SaaS or vendors but rarely check their security posture, leaving exploitable blind spots.

    A consistently overlooked mistake is lacking a safe place to open suspicious files. This doesn’t require a full-blown SOC or complex infrastructure — just a browser-based sandbox that lets your team safely detonate files in isolation.

    Tools that enable this are easy to implement, yet many teams skip them entirely, assuming antivirus or email filters are “good enough.”

    As a result, a single PDF or ZIP can slip through and trigger a compromise, especially where access controls are weak. Ultimately, it’s not just about detection — it’s about instilling a habit and providing a platform for your team to verify files before trusting them.

    Practical security moves for small teams

    Even without a dedicated SecOps function, early-stage startups can now reach higher levels of security maturity thanks to accessible, lightweight tools:

    • SOC-as-a-Service: fractional security operations give small teams 24/7 monitoring, real-time alert triage, and incident response for a fraction of the cost of hiring analysts, often under $1,000 per month.
    • Identity and access management: platforms such as Okta, Google Workspace with conditional access, or Tailscale help enforce MFA, granular access policies, and session visibility using the same APIs and dashboards developers already work with.
    • Sandboxing and threat detection: modern browser-based sandboxes allow teams to safely detonate suspicious files and analyse malware behaviour. Combined with threat-intelligence feeds, they can instantly flag malicious URLs, file hashes, and reused attacker infrastructure — a key advantage in regions where phishing portals and CDN links are recycled frequently.
    • Securing the build pipeline: integrate CI/CD scans (e.g., GitHub Actions) to catch known CVEs, leaked secrets, and dependency risks early.
    • Leaning on security advisors: fractional CISOs or experienced advisors can help shape policies and guide incident response without the overhead of a full-time hire.

    These practices don’t just close security gaps—they can also make a startup more credible to investors and partners. Keeping sandbox logs and IOC reports from suspected incidents shows that detection and response aren’t just aspirational.

    A simple security whitepaper outlining key controls — identity management, backups, incident response — gives partners and investors clarity about how you operate. Regularly auditing third-party dependencies, especially open-source libraries, and pinning versions reduces supply-chain risk. And when your response plans are not only documented but also practised and version-controlled, it signals the kind of operational maturity investors value.

    Five-step starter playbook for cybersecurity at a startup

    Startups don’t need to build enterprise-grade security overnight, but a few foundational practices can make a dramatic difference in both security maturity and credibility.

    1. Identity first: enforce MFA across all tools and eliminate shared logins via a password manager such as 1Password or Bitwarden.
    2. Segment everything: separate dev, prod, and CI/CD into isolated VPCs with role-based IAM.
    3. Sandbox early: integrate a sandbox to inspect suspicious documents, installers, and links before user execution.
    4. Log and retain: utilise centralised logging solutions such as open-source tools like Wazuh SIEM to retain 30+ days of audit and network activity logs.
    5. Test the human layer: run phishing simulations quarterly and train staff to recognise lures across email, LinkedIn, and WhatsApp.

    These steps will not only reduce the likelihood of a breach but also build trust with users, speed up procurement, and make due diligence smoother when you’re raising capital.

    Continue Reading

  • Dental Caries and Oral Mucositis Among Children Undergoing Cancer Therapy at Kenyatta National Hospital, Kenya: A Cross-Sectional Study

    Dental Caries and Oral Mucositis Among Children Undergoing Cancer Therapy at Kenyatta National Hospital, Kenya: A Cross-Sectional Study


    Continue Reading

  • Rupee may rely on central bank support; bonds to track inflation data – Reuters

    1. Rupee may rely on central bank support; bonds to track inflation data  Reuters
    2. Undervalued or still vulnerable? Indian rupee’s path splits analysts  Business Recorder
    3. INDIA RUPEE-Rupee finds breathing room, aided by central bank defence of key level  MarketScreener
    4. Currency watch: Rupee rises 7 paise to 88.72 against dollar; domestic markets and crude oil support gains  The Times of India
    5. RBI tethers rupee near record low even as gold rally adds to headwinds  TradingView

    Continue Reading

  • China’s state iron ore buyer offers BHP cargoes for sale amid ban fears

    China’s state iron ore buyer offers BHP cargoes for sale amid ban fears

    (Reuters) -Several cargoes of BHP iron ore were put up for sale in China on Thursday and at least one was sold to a local trader, potentially defusing concerns in Australia that Beijing had imposed a ban on iron ore sales from the world’s biggest miner.

    BHP sold a 170,000-metric-ton cargo to a Chinese trader on Thursday, the first day of trading after China’s week-long national holiday, according to two traders with direct knowledge of the matter. The cargo was paid for in dollars, they said.

    The same day, the Shanghai branch of China Mineral Resources Group (CMRG) – set up in 2022 to centralise iron ore purchasing and win better terms from miners – offered eight cargoes of BHP iron ore totaling 1.14 million tons to steelmakers, according to an offer sheet reviewed by Reuters.

    AUSTRALIAN FEARS OF CHINESE BAN ON ITS IRON EXPORTS

    Bloomberg reported last month that CMRG had told major steelmakers and traders to temporarily halt purchases of all new BHP cargoes, escalating an earlier pause on purchases of BHP’s Jimblebar fines product, a type of iron ore, during a standoff in negotiations over new term contracts.

    That news triggered fears in Canberra that China was preparing a ban on Australia’s most profitable export, much as it did with coal and other commodities in 2020.

    While CMRG told steelmakers last month during negotiations with BHP not to buy BHP’s Jimblebar fines, purchases of other grades of iron ore can be made with permission from CMRG, two other sources with direct knowledge of the matter told Reuters.

    TRADE IN BHP’S JIMBLEBAR FINES STILL FROZEN

    None of the cargoes sold or offered on Thursday were Jimblebar fines, whose trade remains frozen according to all four sources.

    Reuters could not determine when CMRG bought its cargoes from BHP or how many cargoes have been sold.

    CMRG did not respond to Reuters’ emailed request for comment.

    A BHP spokesperson said that BHP does not comment on commercial negotiations.

    Jimblebar is a small but liquid product, with roughly 40 million tons a year produced, for which a limited shortage would be unlikely to trigger a rally in iron ore prices, the two trader sources said.

    Rio Tinto’s flagship Pilbara fines product could also act as a substitute, they added.

    Last week, BHP CEO Mike Henry doused concerns about CMRG’s decision in talks with Australian Treasurer Jim Chalmers, according to local media, saying the move was part of commercial negotiations.

    The Treasurer’s office did not respond to a request for comment.

    (Reporting by Reuters staff in Beijing and Melbourne; Editing by Joe Bavier)

    Continue Reading

  • Access Denied


    Access Denied

    You don’t have permission to access “http://www.cnbc.com/2025/10/13/experts-warn-ai-llm-chatgpt-gemini-perplexity-claude-grok-copilot-could-reshape-teen-youth-brains.html” on this server.

    Reference #18.dcd5ce17.1760319304.9c184e87

    https://errors.edgesuite.net/18.dcd5ce17.1760319304.9c184e87

    Continue Reading

  • InnoTek Secures Contract to Supply Components to Nvidia

    InnoTek Secures Contract to Supply Components to Nvidia

    By Amanda Lee

    A subsidiary of InnoTek, a Singapore-listed precision metal components manufacturer, has secured a contract to supply components for Nvidia products.

    InnoTek said Monday that it had been approved as a recommended vendor for Nvidia a well as IEIT Systems.

    Magix Mechatronics (Dongguan), an InnoTek subsidiary, has secured initial precision machining orders for components used in Nvidia's products, InnoTek said. The value of the contract wasn't provided.

    Production of components for Nvidia is expected to begin in the fourth quarter of its fiscal year 2025.

    In the same statement to the stock exchange, Innotek said another subsidiary, Sun Mansfield Manufacturing (Dongguan), won a new project by Shenzhen Stock Exchange-listed IEIT Systems, a provider of data centre and cloud computing infrastructure.

    InnoTek expects to begin production of metal casings and components for GPU servers for IEIT from October this year.

    Write to Amanda Lee at amanda.lee@wsj.com

    (END) Dow Jones Newswires

    October 12, 2025 20:56 ET (00:56 GMT)

    Copyright (c) 2025 Dow Jones & Company, Inc.

    Continue Reading