Asian markets

Asian markets

Asia has a longstanding history of lucrative trade routes. In the 21st century, much of the cross-frontier commerce relies on organizations utilizing the power of the internet. But its worth considering how many of Asia's key trade associations were first established, many centuries ago. A lot of these relationships persist to this day.

Innovation and good business ideas travel a great distance – and one of the fundamental drivers of this is travel. There is nothing new in this as a concept – in Asia, the routes that were most responsible for the dissemination of innovative ideas were the so-called silk roads.

The beginning of the Silk Road trade network that extended to the Roman Empire. The main route of the Silk Road traveled through China into Central Asia, Korea, India, Pakistan, Tibet, Uzbekistan, Tajikistan, Kyrgyzstan, Turkmenistan, Afghanistan, Kazakhstan, Persia, Iraq, Turkey, Greece and the shores of the Mediterranean Sea. Together with merchant caravans Buddhist monks went from India to Central Asia and China, preaching their religion. While many different kinds of merchandise traveled along the Silk Road, the name comes from the popularity of Chinese silk with the west, especially with Rome. 1271-1295. Marco Polo. The most famous of the Silk Road travelers, who, by his own account, worked for Qubilai Khan traveled the Silk Road.

Think of one of humankind's most important inventions – of all time. That would be paper. This was first created in China, during the Han dynasty, coinciding with trade becoming increasingly prevalent along the silk road. Paper was considered so revolutionary at the time, because prior to its appearance amongst the caravans plodding along the vast cross-Asian highways, written communication relied on narrow wooden strips, or cumbersome rolls of silk. But thanks to the demand for this new substance that could be satisfied with the convenience of the silk roads, the idea quickly took hold in other parts of Easy Asia.

It took longer for paper to establish itself as the writing platform of choice in the northwest of China. Apart from proving ever more popular in Buddhist temples, the surrounding towns and villages were more content to hang on to the archaic papyrus and parchment methods of writing. But with the ebb and flow of civilizations in that part of the world, the influence of the all-conquering Mongols ensured that papyrus was superseded throughout China. As the world grew increasingly open over the centuries, Chinese ingenuity began arriving in the Middle East, and then making its way to Western Europe.

Another invention that spread across the world in a westwards direction was the use of water wheels for irrigation. Attributed to ancient engineers in the Roman province of Syria, the use of pots attached to a vertical waterwheel, driven by river currents, became relied upon for lifting water from its source. The fact this could be done without the input of human or animal force made it very appealing to all manner of tradespeople.

As well as these innovations, the silk roads winding their way across the vast Asian steppes, across the Caucasian Mountains and eventually into Europe, brought with them a host of exotic foodstuffs. Oranges, grapes, spices and a tremendous range of produce began making its way across the huge distances between nations, with demand rising as products gained new audiences.

The camel caravans that once plied their trade along the silk road have long been superseded by quicker, more efficient mechanized transport. But the essential ingredients of the Asia trade sector remain unchanged. Different cultures can have their diverse demands for items satisfied. Except, with the benefit of today's technological advances, it is possible for a consumer in Europe to order services from someone in China, with a few clicks of a keyboard.

Cyber health checks

Cyber health checks

Given that malware and other forms of internet sabotage have the potential to cost e-Commerce companies a vast amount of money, a timely announcement has come from IT Governance. This cyber security service is launching a specific ‘cyber health check' aimed at providing a sense of reassurance for a cross-section of small to medium-sized organisations.

This check, instigated back in 2014, will not be tailored to the size of the company under the spotlight. Instead the check will be available at a fixed-rate price. Consultancy will be offered on-site, as well as a full audit of respective computer infrastructures. Following-on from the exhaustive data checking, a report into the remote vulnerability assessment will enable managers to get an accurate snapshot of exactly how robust their organisation currently is.

A survey conducted by British Telecommunications last year demonstrated that companies in the United Kingdom were lagging some way behind their American counterparts in several crucial area of IT security. This discrepancy was most marked in respective levels of preparedness for countering threats. This attitude extrapolates to how robust any organisation is likely to be in combating the incredibly diverse range of online threats, whether that be non-malicious insider threats, or direct attacks by hackers. Perhaps the fact that the US continues to shrug off the paralysing effects of the September 11 attacks has implanted a more deep-rooted fear of malicious cyber activity.

The Founder and Executive Chairman of IT Governance, Alan Calder, stated: ‘With the proliferation of cyber attacks, the UK organizations' ability to assess the cyber risks and put relevant controls in place will be increasingly tested. Those who take the right measures, and on time, will be able to withstand an attack and those, who don't, will fail. Identifying the gaps between your targeted risk mitigation position and your current situation is a critical step for developing a business-led cyber security strategy that will ensure your future business resilience'.

If organizations are in any way under-prepared for perceived cyber threats in the current environment, they would be advised to take the appropriate action. The future of the internet, with technology such as Cloud services emerging, means that the number of potential areas to be exploited by hackers is increasing rather than shrinking.

According to security spokespeople, migration to the web, coupled with increasingly sophisticated software, will create ever more vulnerability for e-Commerce. This, in turn, will draw cyber attackers like a magnet. What may well inspire management teams to shrug off their complacency are the results of these cyber health checks. It might come as a surprise to these organizations to find that they are not currently under attack – but their defenses were breached many months ago.

10 ways BT Virus Protect helps keep your computer safe

1. VirusScan

VirusScan runs in the background of your computer, continually monitoring in-real time for viruses, Trojans, tracking cookies, adware, spyware, unwanted programs and threats from email or instant messaging.

If it identifies a threat, it deals with it before it can do any damage, or lets you know if you need to take further action.

2. SiteAdvisor

Some websites include spyware, spam and online scams. SiteAdvisor checks for threatening websites and warns you before you interact with them.

3. Personal Firewall

Virus Protect has a built in-firewall which protects your network, acting as a virtual gateway for incoming traffic, letting in safe traffic and blocking incoming threats including hackers.

4. Parental controls

Protect your children from online dangers with Virus Protect's Parental Controls. Turn on age-appropriate searches, set web browsing limits and filter inappropriate websites. You can also chose to restrict access to specific websites and block access based on keywords.

5. Clean-up tools

Keep your home PC running at optimum performance with Virus Protect's health tools, including automated file, browser and browser history clean-up and disc defragmentation.

6. Spyware protection

Spyware is software that gets information from your computer without your knowledge and can make changes to your computer, slowing it down in the process. Virus Plus protects, detects and removes spyware and adware, as well as blocking tracking cookies.

7. Stealth mode

This mode allows you to use the internet anonymously, so your machine can't be seen by hackers.

8. Vulnerability Scanner

Companies like Microsoft, Google and Adobe continually releases software updates for their software often containing crucial security updates, so it's important to keep your machine up to date. Vulnerability Scanner installs the latest Windows updates, and those from other programs.

9. McAfee SystemGuards

McAfee SystemGuards monitor your computer for tell-tale signals of viruses, spyware and hacking activity.

10. McAfee Security Centre

Use this to review your computer's security status, check for updates and fix security issues.

 How to get Virus Protect:

1. Visit My BT and log in or sign up

2. Scroll down to My Extras, look for the BT Virus Protect panel and click Get Started.

3. Follow instructions to activate Virus Protect and begin the download.

4. Download and install it, look for the McAfee icon in your system tray, which means you are protected.

McAfee are one of many well-known security companies that produce apps for anti-virus/malware. We suggest it might be a good idea to have a few different security apps available from companies including Trend micro, Avast, Kaspersky.

Deep sea exploration news

Deep sea exploration news

When it comes to boldly going where no man has gone before, to paraphrase the somewhat sexist statement from television's Star Trek series, one thing is for sure. The deepest points in the ocean of our planet are far more mysterious and impenetrable than some of the locations in outer space. This is a fact – we know more about what the surface of the planet Mars looks like than we do what lies at the foot of the Pacific Ocean.

Uncovering the foreboding undersea world has captivated the imagination of humankind for centuries. The difference is that technology has advanced to a stage that we can now send vessels to depths that were unimaginable until fairly recently. The deepest portion of the ocean is the Challenger Deep, lying at the base of the Mariana Trench. This is a mind-boggling 11 kilometers beneath the surface. In March 2012, the movie director James Cameron (perhaps most widely known for his blockbuster Titanic) entered a self-designed submersible, called the Deepsea Challenger. This was kitted out for exploration and research, allowing Cameron to take samples as well as thoroughly documenting his dive in high-resolution 3D film.

Cameron's CV might well be headed ‘movie director', but he is the veteran of 72 submersible operations to date. 51 of these were accomplished in the Russian craft Mir. The latter vessels were used for dives to 4,900 meters during his research for the Titanic. In his most recent exploration, to the uncharted depths of the Challenger Deep, his craft was a claustrophobic vessel made primarily of specialized glass foam. This material had to be robust enough to withstand the tremendous pressures at that depth. As Cameron slipped through the waters, he sampled material for scientific research, as well as making a feature-length documentary.

This was a particularly tricky assignment because sunlight does not penetrate to these depths, and the pressure exerted by the sheer weight of water is equivalent to a thousand times what is experienced above the surface. Nevertheless, the research vessel filmed previously unseen aquatic life-forms, as well as scooping up samples of rocks, minerals and animals. As well as being of vital importance to natural historians, the rock samples help geologists to understand the forces that cause earthquakes and tsunamis. The dive also provided answers to questions about the very origins of life on earth.

Facts amongst Star Wars fiction

Facts amongst Star Wars fiction

There is a temptation to view the most popular science fiction movie franchise of all time as ‘hokum' – escapist nonsense that introduces the viewer to fabulous worlds and wacky characters. But, believe it or not, a lot of the fiction portrayed in the Star Wars films (all six of them, with more in the pipeline) is actually grounded in fact. So what aspects of these blockbusters can be termed ‘science fact'?

One of the most exhilarating sequences in the Star Wars movies was the speeder bike scene in Return of the Jedi, the third film in the series. This involved what looked like a cross between motorcycles and hovercraft racing across a deeply-forested landscape, zig-zagging between trees. For a lot of adolescent fans, the closest they came to emulating the action was to furiously pedal their bikes along woodland trails, making the appropriate sound effects with their excitable mouths. However, a New York-based development company called Aerofex are currently involved in research into what they call ‘low altitude tandem duct vehicles'. The best way to think of these is scaled-down Hawker Harrier jump jets – the world-renowned Royal Air Force fighter jets that can take-off and land vertically. These craft would be ideal for navigating across inaccessible regions, such as the Australian Outback, or East Africa, and would be suited to flying doctors. At a present price tag of up to $100,000, the casual movie fan might have to wait awhile before purchasing one to keep in the garage.

The staple of the battle scenes in every Star Wars feature has been laser guns. Emitting piercing bolts or light, they mow down the dreaded Imperial storm troopers at a fearsome raye. The US Navy has been testing laser cannons mounted on warships, known as the ‘Laser Weapon System (LWS)'. One advantage of this potentially-destructive future artillery is cost. Laser beams cost a fraction of the price of missiles, the latter costing several hundred thousand dollars per weapon, putting the soldiers aiming said devices under considerable pressure!

Unlike the movie versions of laser firefights, where bolts of light streak across the screen accompanied by striking sound effects, the reality is somewhat more staid. Because lasers travels at the speed of light, the beams fired from these LWS arsenals are invisible to the naked eye. They are also silent.

As for the potential for a weapon with the capability of destroying an entire planet – hopefully that doomsday scenario remains in the realm of science fiction for some considerable time!