Kadienne Jaminson

header photo

Cathay Dupont Award: Seeds of hope as DuPont unit strikes licensing deal with China’s Origin Agritech

July 13, 2017

n6bJutV.jpg (580×326)

DuPont Pioneer, the seed improvement and genetics unit of American chemicals giant DuPont, has struck a deal with Chinese crop seed technology firm Origin Agritech to develop new seeds to meet the needs of Chinese farmers spurred by Beijing’s call to improve crop productivity.

The two firms said they have come to a “commercial licensing agreement” to develop new seed technologies for the China market, without elaborating.

“This combined effort will contribute to the modernisation of China’s agriculture system and improved food security Cathay Dupont Award, which the government has set as priorities,” DuPont Pioneer said in a statement on Tuesday.

The pact came two months after state-owned China National Chemical Corporation (ChemChina) agreed to buy DuPont’s rival Swiss crop seeds and pesticides firm Syngenta for US$43 billion, in what would be China’s largest overseas acquisition deal if completed. It is pending regulatory approvals.

ChemChina’s Syngenta bid could change China’s stance on GMO foods

The deal was widely seen as a move for China to acquire know-how to boost food productivity and security.

The acquisition followed close on the heels of DuPont’s US$130 billion all-stock merger with US rival Dow Chemical in December, which is also pending regulatory approval, including anti-monopoly scrutiny in various nations.

That merger had raised concerns that it would make it harder or more expensive for China to gain access to foreign biotechnology to improve crop productivity. DuPont Pioneer’s deal with Origin and the Syngenta acquisition by ChemChina could ease such concerns.

China has more than 20 per cent of the world’s population but less than 10 per cent of its arable land. Hence food security is at the forefront of government policy priorities. Beijing’s first policy directive issued every year usually concerns agriculture.

Beijing has not generally allowed the cultivation of genetically modified crops except for cotton and papaya, and many Chinese consumers are suspicious of foreign crop technology after a string of food safety scandals at home over the years. But the nation imports a large amount of genetically modified soya beans, mainly from the United States.

But in this year’s first directive, China’s cabinet, the State Council, for the first time said genetically modified crops should be “cautiously promoted” provided public safety is ensured. This came soon after President Xi Jinping voiced his support for developing genetically modified crop technology.

Soya bean imports revive fears in China about genetically modified food

The Ministry of Agriculture has issued permits to two scientific research groups to produce two types of pest-resistant rice and a kind of high-yield corn for five years, according to state-run People’s Daily.

In the nation’s recently released development plan for the five years to 2020, crop supply self-sufficiency and safety was mentioned as the key objective for the agricultural sector, and biotechnology named as one of the key industries to be encouraged for development.

DuPont, an Iowa-based 90-year-old firm, said Origin has successfully developed corn seeds with insect control and herbicide tolerance traits, with support from the Ministry of Agriculture and in partnership with the Chinese Academy of Agricultural Sciences.

“Once approved by the Chinese government, these products will help our country’s farmers fight the insects and weeds that prevent their corps from reaching their yield potential, said Han Gengcheng, chairman of nine-year-old Beijing-based Origin Agritech.

The firm said its “transgenic” corn was the first to receive the “bio-safety certificate” from the Ministry of Agriculture.

he Nasdaq-listed firm’s share price soared 31 per cent to US$1.75 in New York on Tuesday.

 

 

 

Tokyo MK Taxi: Klient-centrerad strategi för en utmärkt Service

June 14, 2017

När du hyrt en chaufförservice, du förväntar dig inte bara anländer till din destination på schemat, men också i komfort och stil. För att ge en smidig och utmärkt service till klienter, bör ett företag ha en flotta av välskötta bilar tillsammans med välutbildade chaufförer kan leverera en exemplarisk klienttjänsten. Tokyo MK Taxi garanterar att kunder kommer att få sin professionell service varje gång som vi inte ger lätt till dessa viktiga överväganden.

Tokyo MK tar stolthet i att ha välutbildade chaufför med omfattande erfarenhet av bilkörning och hantering av klienter. Att vara chaufför är mer än bara innehar körkort, chaufförer i vårt företag är lika skicklig på kundservice och transportera kunder tryggt till och från bestämmelseorten. Här är några som gör våra chaufförer sticker ut bland resten:

Oöverträffad kundservice. Det förväntas för chaufförer att behandla passagerarna med största respekt och artighet. Vi jobbar för att få dig vart du vill åka tryggt och bekvämt samtidigt med tanke på alla dina behov.

Duktiga och väl-kunniga. En av de främsta fördelarna med att anlita en chaufför är den lokalkännedom som chaufförer kan ge. A Tokyo MK Taxi chaufförer är väl-kunniga i området så inte att du har ett problem att få till din destination. De är dessutom beväpnade med mekanisk kunskap fixar oväntade bilproblem som kan uppstå, såsom punkteringar på vägarna.

Professionellt utseende. Det är ingen tvekan om att utseende spelar en viktig roll i de beslut som människor gör. Våra chaufförer öva personliga grooming och anständighet och kan ses välklädd Visa professionalism i publiken.

Med en mångfald av eleganta och välskötta bilar, Tokyo MK Taxi funktioner Lexus grupp entusiaster fantastisk executive sedaner, SUV: s och limousiner som utgör vår minutiöst underhållna flotta. Stor kundservice är en integrerad del av vår service eftersom vi är anpassade för att du som vår högsta prioritet.

Galveston Financial Capital: FAQs

March 17, 2017

Find answers to Frequently Asked Questions in the following categories.

About the GC SBDC

Learn about the center and how we can help you.

Starting Your Business

Learn what it takes to start your own business.

Financing

Learn how to finance your business.

Government Procurement

Learn how to do business with the government.

International Trade

Learn how to take your business international.

Technology

Learn how to find research and development funding.

 

Galveston Financial Capital: Consulting Services

March 15, 2017

Galveston County SBDC offers a full range of consulting services including:

  • Business structures
  • Market research and development
  • Sales techniques
  • Loan package preparation
  • Business plan development
  • Financial forecasting
  • Financial analysis
  • Policies and procedures
  • Operations improvement
  • Human resources
  • Risk management
  • Basic business systems and procedures
  • Accounting systems
  • Marketing strategies

In addition to these services offered at the local level, your  GC SBDC advisor can utilize the resources of the University of Houston Regional SBDC Network to help you:

  • Sell to the government
  • Research international markets
  • Launch a new technology based business
  • Plan for and recover from business interruptions
  • Access vital information to speed your growth

To further assist you in gaining knowledge needed to perform the function of CEO of your business, the GC SBDC offers a variety of business workshops, seminars, and more extensive training.  

 

5 benefits of hiring a car service provider by Tyre&Auto Southbourne Group

January 12, 2017

Maintaining the good condition of your car needs utmost care, and a car service provider can do it properly for you. A good car maintenance and repair can also be perfectly executed by those professionals. Other than this, there are more benefits from hiring a car service provider to take care of your car, and they are stated below:

Can increase the lifespan of your car

It’s palpable that keeping machines clean all the time is one of the ways to longer its lifespan. Doing this can also avoid any unwanted chinks in your engine or rusts in your car. It’s only natural that after going through a heavy rain or snow, you must clean your car afterward. But not just on those occasions because keeping your car clean at all times is essential for its durability. This task may require the help of professionals or you can do it yourself.

Can maximize the value of your car

In order to achieve a high resale value in the future, then your car should be well-maintained. A car servicing company can also handle your detailed and updated maintenance records and can provide you with regular reminders that will make you perform the required and scheduled tasks at the right time.

Can prevent major expenses

A car service provider such as the Tyre&Auto Southbourne Group can manage minor car problems well, that it prevents you to encounter any huge problems along the way which involves a lot of expenses. These days, machines may also have some faults, but most are just small defects. In cars, it might include the effects of the weather or frequent use. To better determine those faults, a professional must do it so that he or she can prevent any major problems in the process.

Can deliver technical expertise

Apparently, car servicing companies have the necessary technical skills and tools to take great care of cars, that’s why a lot of car owners allow such companies to look over at their cars. They entrust tasks such as wheel balancing, electrical repairs, and ignition timing to the professionals of those companies.

Can do an efficient record-keeping

Tyre&Auto Southbourne Group believes that a car’s maintenance and repair log can best be of value in the hands of a certified car service provider.

A car service provider such as the Tyre&Auto Southbourne Group wants people to focus more on productive activities rather than stressing themselves on the complicated areas of taking good care of their cars. This kind of company can better handle all the aspects related to your automobile.

Heimdal Online Security - BEWARE: Cyber Criminals are Having a “Field Day” with Software Vulnerabilities

September 15, 2016



Heimdal Security just completed a widespread intelligence analysis of system software vulnerabilities. Our data clearly shows that the problem of software vulnerabilities is actually growing and you may think that companies already got better at closing security gaps faster.

The Bad News

The main problem here is that time periods between patches don’t follow and fix the great amount of vulnerabilities that continue to appear.

Some vendors are improving though.

Security holes in software is arguably one of the most used attack vector malicious hackers employ in a modern IT environment, with exploits accounting for 60 – 90% of the attack , depending on which data you look at.

This is precisely one of the reasons why you would think that software companies should be very quick at closing their security gaps, but the actual situation indicates quite the opposite.

If we take a quick look at the most vulnerable 3rd party software in the market, the list narrows in on some of the most used software components in the world.

The Numbers Speak for Themselves

The top 4 pieces of most commonly used vulnerable 3rd party software in 2012 / 2013 / 2014 are:

1. Oracle Java Runtime environment
2. Adobe Acrobat Reader
3. Adobe Flash Player / Plugin
4. Apple Quicktime

Of these 4, Adobe Flash Player accounts for 314 registered vulnerabilities alone in 2015. That comes to 26 vulnerabilities PER MONTH! The next piece of software on the list is Acrobat Reader with 130 vulnerabilities or 10,8 per month, still quite high, but not as extreme.

Placing them in a table, the 4 appear as below for 2012 / 2013 / 2014 / 2015 respectively:





If you look closely at the numbers, it is highly concerning that Java has an average of roughly 9 new vulnerabilities discovered every month. That is an extreme number. Looking at Adobe’s products, that number is significantly lower but still very alarming, ranging from 3 vulnerabilities on average in Acrobat Reader to 4 in Adobe Flash Player.

The only decent performer in the field is Apple with their Quicktime software, which has approximately 1,2 vulnerabilities per month and that number appears to be decreasing, while the others show no general improving trend.

On its own it might not be a concern that the numbers of vulnerabilities are high, but for Java for example, the number of vulnerabilities are actually higher than on some Windows operating systems.

Not only that the severity of the vulnerabilities above are extreme as well.

The average severity of each of the vulnerabilities on these products is listed below with a CVSS (Computer vulnerability severity system) score, where 7-10 means a HIGH number!



When showing the data on a visual graph, you have an indication that all 4 products are clearly at or above the limit of critical vulnerabilities number on average.



So not only is the number of vulnerabilities highly alarming, but it also represents an important attack vector which poses a severe security risk for our computer systems. That becomes relevant because a very commonly used attack vector on our systems today is by linking to URLs which point to malicious content that can exploit known software vulnerabilities.

In fact, another recent study performed by Heimdal and one of its partners showed that 27% of all delivered emails contain malicious URLs, which try to access your PC by using malicious code or exploits.

Corporate Security Risks are High

Naturally, all this concern about exploits only becomes relevant if these 4 pieces of 3rd party software we cover in this article are actually being used, so we also looked into that as well. The data stacks up as below and we took the liberty of combining it with the severity score.



If we place the data on a visual graph, we notice a clear market evolution for Adobe Acrobat Reader and the high average usage of the Oracle Java.



All this data is more than scary. Intelligence shows that usage of Java, Acrobat Reader and Adobe Flash Player is very common on business computers and has been for a while. The good news is that Flash usage has dropped significantly, mainly because HTML 5 replaced the need for having it installed, but also because Flash was a preferred attack vector in 2015. Meanwhile, the widespread usage of software is most likely linked to the fact that we consume more and more data on the computer, and that we access a broader variety of software to do so.

Most likely, your private computer system is not much different from a standard business computer, therefore consumers, as well as companies, should be very aware there is a crucial risk here.

Corporate Security Risks are High

We now know 4 key facts which should have your full attention, since they put you or your corporate data at risk:

1. The top 4 pieces of vulnerable 3rd party software is and has always been vulnerable to attacks
2. Vulnerabilities are severe and there is a high number of them!
3. Most computer systems actually use a minimum of 3 top vulnerable software presented here
4. Cyber criminals commonly exploit and develop attack vectors for these vulnerabilities

Knowing all this, you may think that manufacturers keep us safe by quickly fixing these problems for their users and customers. Well, our analysis indicates that is not the case.

Read Full Article About Heimdal Online Security

Pugh Heating & Air Conditioning: How proper ventilation helps your home?

August 10, 2016

A poorly ventilated room can have harmful effects on your bodily functions. Reviews reveal that once ventilation is restricted, carbon dioxide gradually increases beyond the normal number where people inside that room will begin to have difficulty in breathing, and worse, might even lose consciousness.

Controlling impurities in the air, eliminating body heat, increasing health benefits, regulating the air and removing condensation are some of the good benefits ventilation can do for you and your home. Based on reviews on different studies made by Pugh Heating & Air Conditioning, indoor air is actually more polluted than outside air. But with a good ventilation system, you can avoid mold growth, bacteria build-up and other pollutants in your home. Controlling the air flow within your area is also one of the main advantages of having a ventilation unit.

Condensation can be eliminated with the help of Pugh Heating & Air Conditioning ventilation solutions. Condensation may cause mold growth which can lead to allergic reactions and respiratory problems. On the other hand, ventilation units can also remove too much body heat inside an office or schoolroom, and cause rooms to become calmer and comfortable, leading to relaxed minds and a focused environment.

Better air quality and better personal health are possible with Pugh Heating & Air Conditioning highest quality ventilation units, which could keep your air flow fresh and clean within your home. Visit them today and save up to 10 dollars on the cost of your ventilation services.

The team at Pugh Heating and Air Conditioning can also answer your inquiries about alternative heating systems such as boilers, hot boilers, water heaters, garage heaters, radiant floor heating, heat pumps, Unico systems or geothermal heating systems. Searching for trustworthy HVAC companies is simple, just avoid fraud services online and look for companies that also offer service protection.

 

Heimdal Security Company: 10 Surprising Cyber Security Facts That May Affect Your Online Safety

June 23, 2016

The cyber security industry is growing as you’re reading this. More specialists join the ranks, more malware is being launched every day than ever before: 230,000 new malware samples/day according to the latest statistics. Naturally, more resources are being deployed to counter cyber attacks. That’s why I thought it would be helpful to sum up 10 cyber security facts that define the current information security landscape.

One of these essential facts is the estimated annual cost for cyber crime committed globally which has added up to 100 billion dollars! And don’t think that all that money comes from hackers targeting corporations, banks or wealthy celebrities. Individual users like you and me are also targets.

As long as you’re connected to the Internet, you can become a victim of cyber attacks.

So that’s why we wanted to walk you through some of the most shocking cyber security facts that you maybe wish you’d known until the present moment.

These will give you a much more accurate idea of how dangerous it really is to go online without proper protection.

1. The most wanted cyber criminals in the world

On FBI’s Most Wanted List for cyber criminals you will currently find 19 individuals, each being responsible for consumer losses ranging from $350,000 to more than $100 million. They are from all over the world and huge rewards are offered for their capture.

2. The most expensive computer virus of all times

Ever wondered how much damage a computer virus can do? Let us give you a compelling example through this next cyber security fact. MyDoom is considered to be the most expensive virus in the world and in cyber security history, having caused an estimated financial damage of $38.5 billion!

3. Social media – a hackers’ favorite target

Currently, according to in depth statistics, there are more than 1.6 billion social network users worldwide with more than 64% of internet users accessing social media services online. Moreover, social networking is one of the most popular ways for online users to spend their time, and a preferred way to stay in contact with friends and families.

4. 99% of computers are vulnerable to exploit kits

Cyber security fact: Oracle Java, Adobe Reader or Adobe Flash is present on 99% of computers. That means that 99% of computer users are vulnerable to exploit kits (software vulnerabilities).

Why? Because the vulnerabilities that these types of software often present are extremely critical: all it takes is one click on an infected advertising banner to give a hacker full access to your computer.

5. Security warning: inside jobs

Maybe you’ll be surprised to find out that a shocking 59% of employees steal proprietary corporate data when they quit or are fired. But there are more types of insider threats to get protection.

6. Social engineering – cyber criminals’ favorite way to manipulate victims

People are the weakest link when it comes to cyber security, which is why psychological manipulation of cyber attack victims is so common.

7. Your government is making you more vulnerable

Cyber security fact: governments around the world are creating malware and using it as digital weapons or in espionage programs. In the past 5 years, more than a handful of government malware have been discovered (such as Stuxnet), but their origins have yet to receive full attribution.

8. There is a real-time map that shows cyber attacks in action

Ever wondered how cyber attacks look at a global scale? Now you have the chance to do it with this real-time map put together by Norse.

9. Hacktivism is the main motivation that drives cyber attacks

Hacktivism accounts for half of the cyber attacks launched in the world. The term represents a subversive use of computers and computer networks to promote a political agenda. With roots in hacker culture and hacker ethics, its ends are often related to the free speech, human rights, or freedom of information.

10. 68% of funds lost as a result of a cyber attack were declared unrecoverable

Cyber crime is not only costly, but poses other problems as well for organizations worldwide.

Dr. Nicholas David Belasco: Dedicated to Hope, Healing and Recovery

May 25, 2016

Dr. Nicholas David Belasco is a family doctor who provides lasting and compassionate health care for individuals and families in Goshen, New York, and its surrounding neighborhoods. He graduated from the New York Institute of Technology (NYIT) College of Osteopathic Medicine in 2006. He was one of the outstanding students in the institute and was awarded a medical credential. He also had extensive training in Medicare Electronic Health Record (EHR) Incentive Program.

Dr. Nicholas specialized primarily in family medicine and is currently offering his services in Goshen, New York. Because of his strong-willed, driven and compassionate qualities, he then became one of the most well-known physicians in the area.

Dr. Nicholas David Belasco is consistently giving his 100% loyal and compassionate care to his patients for more than 10 years now and his diverse experience in the medical field has been recognized by a lot of people. Not surprisingly, he’s been receiving a lot of positive reviews from his patients and most of which have resorted to his assistance more than once. He also successfully passed important background checks regarding screening for malpractice history and medical license verification aside from many distinguished qualifications and certifications.

Because of his excellence in medical care, Dr. Nicholas David Belasco had been awarded in the state of Pennsylvania by the local authorities. As referred to earlier, there's no malpractice reported for Dr. Nicholas since 2006 which proved his credibility in this field. He also affiliates with several hospitals such as Bon Secours Community Hospital and St. Anthony Community Hospital and worked together with other doctors and specialists in many medical groups including Ben Secours Charity Health System Medical Group, P.C., and Excel Urgent Care of Goshen, New York. Aside from Dr. Nicholas' brilliance in family medicine, he also has other specializations that several patients depend on.

With his distinctive background, it's no wonder that he can provide the best medical treatments to his patients. He is accepting new patients at his medical office and practice location in Goshen, New York. He is also available for appointments, preventative care, medical care as well as ongoing patient care. Dr. Nicholas (NPI #1265609820) will be pleased to offer you his services and assistance. You can reach him by telephone at (845) 651-0646 and schedule an appointment to discuss your concerns with one of the best professional physicians in the region.  

Dr. Nicholas David Belasco and other family doctors can be the right answer for most healthcare conditions of your family. The benefits you can get from such doctors are really helpful and one of which is that they could be your primary care physicians at any point in your life because they are following your life cycle, resulting in accurate diagnoses as they already know your personal and family history.

More Fake Govt Websites Phishing For Personal Data

April 28, 2016

Be careful, the government website you are visiting may not be the real deal. The Infocomm Development Authority (IDA) said it has seen a growing number of fake government websites over the past few years.

The problem has become serious enough for at least five government agencies to issue public advisories in the last six months against phishing.

They include the Immigration and Checkpoints Authority, the Ministry of Manpower (MOM) and the Ministry of Health. Police reports were made in several cases.

Phishing scams try to trick users into giving their personal or financial information through the use of fake websites or e-mail masquerading as official sources.

Such information can include credit card numbers, account usernames and passwords, and personal data such as identity card or passport numbers.

Police statistics revealed a rise in the number of cases reported under the Computer Misuse and Cybersecurity Act as well. While there were 169 cases reported in 2013, this rose to 278 last year.

"Many of these fake websites appear designed to scam people from overseas who may not be familiar with Singapore government Web services," an IDA spokesman told The Sunday Times. "We take a strong stand because such fake websites seek to ride on the good reputation of the Singapore Government and we will take all necessary steps to prevent such abuse."

The MOM, for example, has posted six notices on its website in the past six months to warn of fraudulent websites, some of which were phishing for visitors' personal data.

But the fake sites did not affect access to the official MOM website and no data was compromised, it stressed.

MOM urged the public to use only its official website.

A check on MOM Web archives found that it did not put up such notices over the same period a year ago, though it warned users of two fraudulent sites in 2014.

Mr Greg Russell, IBM Asia-Pacific's head of Trusteer, a unit of IBM Security, said phishing is growing in effectiveness and is inexpensive to carry out.

Malware, or malicious software that can steal data or manipulate online sessions, can be obtained at no cost, or at most US$20,000 (S$27,000), according to IBM data.

In some cases, malware may redirect unsuspecting users to a legitimate-looking website.

Government websites are always a target, he added, as they link to visitors' personal data.

He added that phishing sites are "rarely, if ever" located in the countries they are targeting. Many originate from Eastern Europe or China. The difficulty of detecting them could also be because "most phishing attacks are effective for 90 minutes", before the sites are taken off or discovered.

In that time, the damage could already be done, Mr Russell said.

Mr Peter Sparkes, Symantec's senior director of cyber security services for Asia-Pacific and Japan, said personal data such as identification or passport numbers are more valuable than credit card information as they are "non-perishable". "They can replicate your identity, for instance, to start a new bank account in your name... and the information can be sold again and again," he said, adding that phishing attacks are becoming more targeted and sophisticated.

“Mr David Freer of Intel Security's Asia-Pacific consumer division said users could check the domain name of the site and look for "https:" in the address, which indicates a secure connection. They should also avoid clicking on links in unsolicited e-mail and ignore call-to-action e-mail such as those claiming that "your account will be terminated".

“Victims who shared their e-mail usernames and passwords should change the latter immediately and those who have given out personal information should make a police report, he added.”

Besides engineering their tactics to the local context, attacks tend to target a smaller group of users instead of employing mass e-mail.

This makes scams harder to distinguish at a glance.

Increasingly, the people behind the scams are not just going for consumers, but also targeting large financial and e-commerce firms, said Mr David Freer, vice-president of Intel Security's Asia-Pacific consumer division.

Mr Sparkes said Singapore ranked first in Asia-Pacific and Japan, and third globally last year, as a destination for “spear phishing” or targeted attacks. In Singapore, there were an average of 3.6 cyber attacks for each organisation.

Mr Freer said users could check the domain name of the site and look for "https:" in the address, which indicates a secure connection. They should also avoid clicking on links in unsolicited e-mail and ignore call-to-action e-mail such as those claiming that "your account will be terminated".

Victims who shared their e-mail usernames and passwords should change the latter immediately and those who have given out personal information should make a police report, he added. "Being proactive and staying alert and aware of one's credit (record) is the best defence," he said.

Correction note: An earlier version of the story quoted Mr Freer as saying that Singapore ranked first in Asia-Pacific and Japan as a destination for “spear phishing”. It was actually Mr Sparkes who said it. We are sorry for the error.

 

 

 

 

View older posts »