Stem education for life to reach new heights


It is necessary for the nation to embrace Stem education in order to reach new heights.

IT is imperative that schools and educational institutions do their part to emphasise the importance of Science, Technology, Engineering and Mathematics (Stem) to meet the country’s educational objectives for future growth and development and to meet the nation’s 2020 vision.

Stem EducationProf Ewe Hong TatUniversiti Tunku Abdul Rahman vice president (Internationalisation and Academic Development) Prof Dr Ewe Hong Tat

This is especially after Malaysia was ranked in the bottom third of 74 participating countries, in the Programme for International Student Assessment (Pisa) below the international and OECD (Organisation for Economic Co-operation and Development) average.

It is with this in mind that Universiti Tunku Abdul Rahman (UTAR ) is taking the initiative to promote and create awareness on the importance of Stem education among students and the community.

In the series of articles from UTAR, Part 1 and Part 2 ( STEM Education for life, part 2 introduces Stem and why such education is necessary for the nation’s development and what the University is doing to promote it.

Engineering gains

During the turn of the century, the National Academy of Engineering of USA (http://www.nae.edu/) did a detailed study and listed the top 20 engineering achievements of the 20th century (www.greatachievements.org) that changed the world.

Of these the prominent ones were computers, aviation, the Internet, air-conditioning and refrigeration, highways, health technologies, laser and fibre optics, water supply and distribution; among many others. Consumers used them daily without realising that these were the results of engineering research and innovation that propelled the world forward.

Therefore, for a nation to continue to develop and grow, it is important to promote and use Stem education as the foundation and propeller of growth.

After all, it is through Stem education that design, discovery and inventions that bring forth life-changing growth and development, have been introduced.

In the 21st century, new innovations have emerged such as renewable energy and resources, Internet of Things (IoT), advanced materials and biotechnology which need new talents to continue to drive growth.

Without a strong foundation in Stem education, these talents will not be groomed to excel.

In the Malaysia Education Blueprint 2013 – 2025 (Chapter 3), Malaysia’s performance in the Trends in International Mathematics and Science Study (Timss) Eighth Grade Mathematics and Science against other countries over three cycles (1999, 2003, 2007), showed that in 2007, there was a marked downturn in both Mathematics and Science scores. In 2003, Malaysia obtained 10th position out of 45 countries for Mathematics and 20th position out of 45 countries for Science.

In 2007, Malaysia obtained 20th position out of 48 countries for Mathematics and 21st position out of 48 countries for Science, thus indicating a declining performance in students’ scores for both subjects.

Malaysia participated in the Pisa assessment for the first time in the Pisa 2009 + exercise and was ranked in the bottom third for Reading, Mathematics and Science, well below the International and OECD average in all the three areas, lower than Thailand.

Therefore, there is a great need to raise the interest and standards in Stem among students, educationists and policy makers in our country to ensure that we remain competitive and relevant in the world market in future.

The National Science Foundation, a leading authority in scientific research and funding in the United States, defines Stem in a broader definition which includes subjects in the fields of engineering, chemistry, computer and information technology science, geosciences, life sciences, mathematical sciences, physics and astronomy, and social sciences (which includes anthropology, economics, psychology and sociology), Stem Education and learning research.

As indicated in the education blueprint, the case for increased emphasis on Stem education would need several initiatives and steps to be taken across schools in the country.

It is imperative that we need to develop strong fundamentals in Stem starting from primary schools and to create and sustain interests in this discipline.

For a start, it would be a good idea to allow a lot more experiments and hands-on projects in Stem subjects.

Experiential learning 

If we want to promote a society with higher order thinking skills, the exam-oriented paper and format-based school exams need to be complemented with more practical and experiential learning.

Learning science subjects through a textbook is nothing compared to the trial and discovery methods of science experiments.

Through the process of experimenting, trials and discovery, students think, analyse and deduce before coming to a solution; all these thinking processes help to develop higher order thinking.

Students need to learn actively to seek creative solutions and applications and to be inquisitive to foster inventions.

The recent announcement by the Education Ministry to reintroduce practical exams for the SPM science subjects of Physics, Chemistry, Biology and Additional Science in 2015, is a move in the right direction.

In addition, the media radio could play a bigger role in promoting Stem.

There could be more focus on Stem and related topics for schoolchildren and even the community, if more films and documentaries on Stem were shown, and how it is important for national growth.

Simple videos could be made on how our everyday resources of food, water, air and energy require qualified engineers, agriculturists, scientists and more to ensure quality, production, convenience and sustainability for the future.

The influence of the internet is pervasive and with Wi-Fi and broadband services increasingly available in many homes and public places, more information can be made available and accessed online.

To promote interest in Stem, perhaps students could be guided towards self-directed learning after school.

Several educational websites support such learning. Massive Open Online Courses (Mooc) are widely available through the web with unlimited participation and many websites provide course materials such as videos, readings and problem-solving papers, while others have more interactive user forums that allow discussions and networking to build a community for students, teachers, professors, and tutors to seek support.

Among the more reliable websites for online courses for students are three more prominent ones such as www.edx.org, www.khanacademy.org and www.coursera.org

EdXoffers free online classes and Mooc from the world’s best universities such as Harvard University, the Massachusetts Institute of Technology, the Australian National University and the University of California, Berkeley on subject contents including Computer Science, Mathematics, Sciences, Medicine and more than 200 courses that students could take online and be awarded a certificate.

The support from these reputable universities gives credibility to the courses and is ideal for students at home.

Khan Academy also provides free online materials and resources in mathematics, biology, chemistry, physics and even finance and history; mostly of secondary school level that are easily available to students, teachers and anyone interested in learning about simple educational topics which makes learning more fun.

Another website worth looking up is www.coursera.org which provides free online classes from more than 80 top universities (such as Stanford University, Yale University and Princeton University) and organisations around the world on topics covering a wide range of disciplines including science, engineering, medicine and social sciences.

A host of varied educational information is available on the web and most are on Stem subjects and topics that are taught in our schools.

Many of the topics in these websites also talk about scientific principles which are applied to everyday things like electrical appliances, transportation, automobiles, food cultivation and processing which are not only educational but also thought-provoking.

The colours and visuals used, the video and notes are all captivating; making learning so much more fun and engaging.

Even the teaching of simple Mathematics in schools is presented methodically and simply with good visuals and commentary.

The advantage of these online courses is that students canrepeat any part as often as they like until they get it right.

These online courses could perhaps be introduced as supplementary learning to students who can log on after school to learn more and cultivate their interests in Stem.

Perhaps parents and teachers alike can also guide students which will be more informative and educational than Facebook and Twitter.

Contributed by Prof Dr Ewe Hong Tat The Star/Asia News Network

The writer, an AAET Fellow, is the vice-president of the Internationalisation and Academic Development, Universiti Tunku Abdul Rahman (UTAR). This article is the first of a two-part series on Stem Education.

Universiti Tunku Abdul Rahman (UTAR)
Dr. Ewe Hong Tat
QUALIFICATION  BEng(Hons)(Mal), S.M. (MIT), PhD(MMU)
POSITION  Vice President (Internationalisation and Academic Development)Professor, Faculty of Engineering and Science (FES)
RESEARCHINTERESTS  Microwave Remote Sensing, Applied Electromagnetics, Satellite Image Processing, Sensing Network and Intelligent Systems
 CONTACT ADDRESS  Universiti Tunku Abdul Rahman (PetalingJaya Campus),No. 9, Jalan Bersatu 13/4,
46200 Petaling Jaya, Selangor, MALAYSIA.
 PHONE  +(60)-3-7958-2628 ext 7152
FAX  +(60)-3-7956-1923
 E-MAIL  eweht@utar.edu.my
HT Ewe received his First Class Honours Bachelor of Engineering degree in Electrical Engineering from University of Malaya, Malaysia in 1992, and S.M. (Master of Science) degree in EECS (Electrical Engineering and Computer Science) from Massachusetts Institute of Technology, U.S.A. in 1994. He obtained his PhD degree from Faculty of Engineering, Multimedia University, Malaysia in 1999. From September 1994 to April 1997, he was with the Electrical Engineering Department, University of Malaya (Malaysia). In May 1997, he joined Multimedia University (Malaysia) in Melaka Campus and was transferred totheCyberjaya Campus in January 2000 and worked there until Aug 2008. In Sep 2008, hejoinedUniversiti Tunku Abdul Rahman (UTAR) andiscurrently a Professor in the Faculty of Engineering and Science (FES).

Experience Publication 

 
 
Related posts:

 It pays to be stern 

 Hats off to a strict father
 
 

Deals mark close relations between Germany and China


Video: German Chancellor meets Chinese Premier, major deals signed

 Germany has hammered out a series of major business deals with China, during Chancellor Angela Merke…
China-Gernany dealsInvestment quota for RMB program to strengthen Germany as yuan center
AT A GLANCE
Deals signed during Angela Merkel’s China visit
• Volkswagen aims to establish two plants in Qingdao and Tianjin with an investment of $2.7 billion.
• Airbus Group will sell 123 helicopters to Chinese companies for general aviation.
• Air China and Lufthansa are in talks that could lead the German and Chinese carriers to form a revenue-sharing joint venture.
• The two countries are planning a joint pilot project concerning Passive House, an energy-efficient method of construction, in Qingdao.
• China will take part as a partner country in the 2015 CeBIT, the world’s leading expo for information technology, in Hanover.

China and Germany will strengthen exchanges in the financial sector and upgrade longstanding cooperation in manufacturing with a slew of deals signed on Monday.

Beijing will grant Berlin an 80 billion yuan ($12.9 billion) quota under the Renminbi Qualified Foreign Institutional Investors plan to accelerate the internationalization of the Chinese currency, reinforcing Frankfurt’s status as a yuan clearing center in Europe, in addition to London and Paris.

A high-level financial dialogue will also be set up to boost financial cooperation, Premier Li Keqiang said at a news conference with visiting German Chancellor Angela Merkel.

President Xi Jinping told Merkel during their meeting, “The series of agreements you have signed during your visit to China will bring new impetus to bilateral ties.”

Xi suggests the two countries take bigger steps in their cooperation, with manufacturing industry as the core.

Merkel said Germany would improve its investment environment and attract more Chinese investors.

She is accompanied by a high-profile business delegation including executives from Siemens, Volkswagen, Airbus, Luft-hansa and Deutsche Bank.

Apart from the financial deal, the countries also signed deals on automobiles, aviation and telecommunications.

China approved London joining the RQFII plan in October, granting investors the right to use the yuan to buy up to 80 billion yuan worth of mainland stocks, bonds and money market instruments.

It later granted Paris the same quota in March.

Luxembourg is also lobbying Beijing for the same treatment after it signed an agreement with China’s central bank for yuan clearing arrangements on June 28.

Li Jianjun, a financial analyst at Bank of China’s International Finance Research Institute, said the competition for offshore yuan centers among major European cities is a healthy feature of cooperation.

“The renminbi is still at the initial stage of internationalization. We are expanding the offshore yuan pie and setting up a global network with overseas financial markets. Allowing qualified foreign institutional investors to use the yuan will benefit China and other countries,” Li said.

Chinese leaders are likely to take Frankfurt as a core center for renminbi clearing services in continental Europe, while establishing secondary yuan clearing sites in Paris and Luxembourg, Li said.

“We cannot cover a wide range and a large amount of renminbi-related businesses with only one center,” Li said. “With Frankfurt as a leading offshore yuan-trading city, we will create a nice layout for renminbi internationalization in Europe.”

In the first five months of 2014, Germany’s direct investment in China reached $810 million, or 30 percent of the $2.69 billion investment in China by all members of the EU, according to the Ministry of Commerce.

In 2013, two-way trade between the countries reached $161 billion, taking up almost one-third of total China-EU trade.

China is Germany’s largest trading partner in the Asia-Pacific region.

Merkel’s visit, her seventh trip to China, came only four months after the last meeting between leaders of the two nations. President Xi Jinping visited Germany in March.

Before flying to Beijing, Merkel stopped at Chengdu, capital of Sichuan province.

Merkel said she felt the dynamics and development of southwestern China in Chengdu, where urbanization is urgently needed to catch up with coastal cities.

“China’s vigor stays not only on the coastline but also in the central and west area,” she said.

Sebastian Heilmann, president of the Mercator Institute for China Studies, said in a recent interview with Deutsche Welle: “Germany provides China with products it needs for industrialization, for example ,machines, specialty chemicals and electronic goods. On the other hand, Chinese consumer goods with very reasonable prices are in high demand in Germany.”

Ren Baiming, a researcher at the Chinese Academy of International Trade and Economic Cooperation at the Ministry of Commerce, said Germany, as well as the European Union at large, need a driving force from the outside for growth, and the fast-growing Chinese market meets that need.

Wu Jiao contributed to this story. – By ZHAO YINAN and JIANG XUEQING (China Daily)
/Asia News Network

Related:

China, Germany pledge to boost cooperation, cement partnership

President Xi met with German Chancellor Merkel and pledged to cement the strategic partnership between the two countries.
China, Germany to promote ties to new progress
China, Germany closer as Merkel visits

Foreign tech firms pose threat on Internet; World’s largest Internet hacker


Foreign Tech firms_ThreatsCompanies asked by Washington to use online services to spy on customers

Foreign technology services providers such as Google and Apple can become cybersecurity threats to Chinese users, security analysts said, one week after China announced that it will put in place a security review on imported technology equipment.

Other major tech companies, such as Yahoo, Cisco, Microsoft and Facebook, were required by the US National Security Agency to transfer their users’ information, according to Wan Tao, founder of Intelligence Defense Friends Laboratory, an independent institution focusing on cybersecurity in China.

Wan said that online services have become a major way for the US to steal information globally.

Foreign tech firms pose threat on Internet

Foreign tech firms pose threat on Internet

Ning Jiajun, a senior researcher at the Advisory Committee for State Informatization, said, “Previously, the US asked companies to install wiretapping software on their technological products, but if users found and shut down related functions, its ‘plan’ would fail,” he said.

For instance, information on a Chinese organization can be stolen when it places an order on an international shopping website, he said.

With technologies such as cloud computing and big data getting popular, information can be collected and analyzed immediately, which means the damage can be much greater and more difficult to prevent, analysts said.

“It can be said that those who master online services can get more information in cyberspace,” said Du Yuejin, director at the National Engineering Laboratory for Cyber Security Emergency Response Technology.

Last month, China’s Internet Media Research Center issued a report saying the NSA makes use of large technology companies for its wiretapping plans, including Prism, which was unmasked by former NSA intelligence leaker Edward Snowden, asking them to collect information on their users and urging them to hand in the data regularly.

The report also said that the NSA has taken iOS and Android, two leading mobile operating systems applied to iPhone and Samsung, as the “gold mine” of data.

The NSA grabbed users’ information and stored most of it for analysis by invading database and communication networks of Yahoo and Google, while it has also controlled applications on smartphones with Britain, said the report released at the end of May.

“The US, in fact, could get these users’ information or conduct the wiretapping by attacking the network instead of ‘cooperating’ with the enterprises, but it might take more time and money,” said Wan.

The actions of the NSA have put huge pressure on US technology companies, as customers from Paris to Sao Paulo and from Beijing to Berlin worry about their privacy being invaded.

US President Barack Obama held two discussions with CEOs of major US technology companies in the past six months about the NSA snooping, which led to a “reform” of the NSA to focus on protecting US citizens’ privacy, but with little improvement on foreign organizations and citizens.

In May, John Chambers, chairman and CEO of Cisco Systems, wrote a letter to Obama urging Washington to stop using the company for surveillance of its customers, according to an Al Jazeera report.

Foreign tech firms pose threat on InternetWeb security firms pledge to patch XP ‘vulnerability’ 

Foreign tech firms pose threat on InternetIBM ‘unaware’ of server ban 

- Contributed By CAO YIN (China Daily)

World’s largest Internet hacker

The spying actions of the US have underscored the urgency of formulating common rules for activities in cyberspace

Last month, the United States Attorney-General Eric Holder announced the indictments of five Chinese military personnel on cyber espionage charges, accusing them of hacking into US companies in the nuclear power, metals and solar products industries. This has seriously compromised relations with China and sabotaged the bilateral cybersecurity cooperation that had been put back onto a normal track after overcoming setbacks.

With the indictments, the US has tried to present itself as the largest victim of cyberattacks, when in fact it is the Cold War mentality and troublemaking of the US that have precipitated the instability and insecurity in cyberspace. If the US doesn’t change its behavior, all peoples in the world may become victims of Internet insecurity.

In June 2013, Edward Snowden, a former US National Security Bureau contractor, revealed US intelligence agencies were conducting large-scale network spy programs, such as PRISM, Xkeyscore and others, across the world. His disclosures indicated the omnipotence of the US’ Internet surveillance and cyberattacks, which range from spying on communication metadata and backbone networks to the monitoring of short message services, instant messaging and video chats; from spying on ordinary people to spying on enterprises, universities, military units and even heads of state, not to mention the revelations about the US’ cyber warfare capabilities.

Aside from its cyber command that has been rapidly growing, the US’ marine, land and air forces have also set up their own cyber headquarters. Cyber combat capabilities are already regarded as part of the weaponry of the US’ fighting forces. A series of US cyber combat programs have been revealed, from Stuxnet to Fslame and X-Plan, all of which indicate that the US has mastered more complicated means and more threatening abilities than other countries in terms of cyberattacks.

The latest indictments against the five Chinese military personnel have also reminded people of a series of previous cyber espionage claims against China by the US. In February 2013, Mandiant, a US cybersecurity firm, released a report accusing China’s military of plotting hacker attacks against US enterprises. After that, many in the US, including the president and senior government officials, expressed a tough stance toward China and threatened economic sanctions against it. Some even suggested that US enterprises “hacked” by China should make cyber counterattacks in retaliation. Such groundless accusations of Chinese cyberattacks have drastically tainted the US’ domestic political environment toward China and also frozen cybersecurity cooperation between the two countries.

The Chinese government has consistently advocated a new type of major-power relations with the US, and it has refrained from overreacting to Washington’s “threatening signals”. Even after the Snowden revelations, the Chinese government still adhered to the principles of no-conflict, no-confrontation, mutual respect and mutually beneficial cooperation, and it is actively pushing for cooperation with the US in cybersecurity and working for the establishment of a cybersecurity work panel under the Sino-US Strategic and Economic Dialogue framework.

All the evidence indicates that it is the US that is the world’s largest Internet hacker and that the global cyber arms race triggered by the US’ actions poses the largest threat to global cybersecurity. The US has so far cited “for the sake of national security” as the only excuse for its pervasive Internet espionage. The US should know that a country cannot put its national security above the interests and national security of other countries and the basic norms of international relations. The double standards the US has embraced in cybersecurity have damaged its credibility and compromised its image as a responsible power.

To enjoy the dividends of the booming Internet sector and communication technologies, cyberspace must be peaceful, safe, open and cooperative. Cyberspace should not be a field for either a cold or hot war, and the latest developments have once again underscored the importance and urgency for formulating common rules for cyber activities.

The US indictments of the Chinese military personnel are not conducive to global efforts to maintain the stability and security of cyberspace. The US, by taking advantage of its technological and military dominance, has established a cyber hegemony. It is hoped the US can lead the global Internet sector to develop in a healthy direction, as it once spearheaded the progress of Internet technologies for human progress.

- Contributed By Tang Lan (China Daily) The author is deputy director of the Institute of Information and Social Development Studies, China Institutes of Contemporary International Relations.

Related posts:

 

As the most notorious surveillance country, the U.S. indictment of Chinese military officers seems almost insolent in a world still reeli…

U.S. cyber attacks, latest data published, China denies accusations…

A spokesperson for China’s State Internet Information Office on Monday published the latest data of U.S. cyber attack, saying that Chi…

  
New security structure needed: Trust, collaboration key to Asian security
Chinese president urges countries to cooperate to promote security Chinese Presi

US-China cyber-battles intensify


The United States has accused some Chinese of hacking into American companies’ computers but the US itself has been engaging in massive spying of foreign companies and trade officials.

Reports of US spying have sparked anger in many countriesUS spying vs China

WE live in a world where “spying” by electronic means is now pervasive and practically no one or institution that uses telephones, smart phones, emails and the internet is protected from intelligence gathering.

This much we know, from the media revelations emerging from files leaked by Edward Snowden, a former contractor with the US National Security Agency.

They showed that the US has been tapping the telephones and emails of Americans and others around the world in a sweeping and systematic way.

It was revealed that even the top political leaders of Germany, Indonesia and Brazil had their mobile phones tapped, leading their countries to protest against such a bold intrusion of privacy and national security.

Last week, the intelligence issue was highlighted again when the US Justice Department indicted five individuals who are members of the Chinese People’s Liberation Army.

They were accused of hacking into the computers of American companies in the nuclear power, steel, aluminium and solar power industries to obtain trade secrets for the benefit of Chinese state owned enterprises.

A Chinese foreign ministry spokesman denounced the allegations as baseless and said China “never engages in the activity of stealing commercial secrets through the internet”, and accused the US of hypocrisy.

It is common knowledge that intelligence agencies use all kinds of devices to gather information and spy on foreigners as well as their own citizens.

The US has the most sophisticated system with the broadest coverage, as the Snowden files revealed.

By charging China of spying on specific American companies for the commercial benefit of Chinese enterprises, the US was trying to draw a very fine line.

It would have been clearly double standards to accuse other countries of spying on government personalities or agencies or on civilians, as the US itself has been shown to be more systematically doing this than any other country.

In announcing the indictment on the five Chinese, the US Attorney General said the hacking was conducted to advantage Chinese enterprises, a tactic that the US denounces.

“We do not collect intelligence to provide a competitive advantage to US companies, or US commercial sectors.”

But in fact the US does spy on companies and trade policy makers and negotiators of other countries, presumably in order to obtain a commercial advantage.

Two articles by David Sanger in the New York Times last week commented on the “fine line” the US attempts to draw between spying for the benefit of specific companies, and for overall commercial advantage.

He gave examples of revelations of US agencies targeting foreign companies.

These include Huawei, a major Chinese internet and communications company.

According to his article, the Snowden documents showed that one purpose of this spying was to “get inside Huawei’s systems and use them to spy on countries that buy the company’s equipment.

“Huawei officials said they failed to understand how that differed meaningfully from what the United States has accused the Chinese of doing.

The US agency also hacked into the computers of Petrobras, Brazil’s national oil company, which has data on Brazil’s offshore oil reserves and perhaps its plans for allocating licences for exploration to foreign companies. State owned oil companies in Saudi Arabia, Mexico, Africa are also intelligence targets.

The NSA also went into the computers of China Telecom, one of the largest providers of mobile phone and Internet services in Chinese cities, and Pacnet, the Hong Kong-based operator of undersea fibre optic cables.

“Once inside those companies’ proprietary technology, the NSA would have access to millions of daily conversations and emails that never touch American shores,” said Sanger.

The NSA spied on Joaquín Almunia, the antitrust commissioner of the European Commission, who had brought charges against several US companies.

In each of these cases, American officials insist the US was never acting on behalf of specific American companies, but the government does not deny it routinely spies to advance American economic advantage as part of national security, said the Sanger article.

This includes spying on European or Asian trade negotiators, using the results to help American trade officials and thus the American industries and workers they are trying to bolster.

According to Sanger, the United States spies regularly for economic advantage when the goal is to support trade talks. When the US was negotiating in the 1990s to reach an accord with Japan, it bugged the Japanese negotiator’s limousine and the main beneficiaries would have been US auto companies and parts suppliers.

The US is also “widely believed to be using intelligence in support of trade negotiations underway with European and Asian trading partners. But in the view of a succession of Democratic and Republican administrations, that is fair game.”

An earlier New York Times article, citing Snowden documents, also revealed that the US and Australian agencies gathered intelligence on Indonesia and a law firm acting for it during US-Indonesia trade negotiations.

This line the US is attempting to draw between what is illegitimate (spying to benefit particular companies) and legitimate (spying to broadly benefit companies and the economy) is not appreciated nor accepted by other countries.

The views expressed are entirely the writer’s own.

Contributed by Global Trends Martin Khor
Martin Khor is the Executive Director of the South Centre since 1 March 2009. He replaced Dr. Yash Tandon who was the Executive Director of the South Centre from 2005-2009

Related posts:

As the most notorious surveillance country, the U.S. indictment of Chinese military officers seems almost insolent in a world still reeli…

A spokesperson for China’s State Internet Information Office on Monday published the latest data of U.S. cyber attack, saying that Chi…

  New security structure needed: Trust, collaboration key to Asian security

Chinese president urges countries to cooperate to promote security Chinese President Xi Jinping says the 4th Co…

New security structure needed: Trust, collaboration key to Asian security


CICA Shanghai

The fourth summit of the Conference on Interaction and Confidence Building Measures in Asia (CICA), under the theme of “enhancing dialogue, confidence and coordination, and on jointly constructing a new Asia with peace, stability and cooperation,” was held in Shanghai Wednesday. Chinese President Xi Jinping delivered a keynote speech calling for a proactive outlook on Asian security and a new security cooperation framework. The intertwined key words have sketched the contours of this summit.

When it comes to Asia, scholars from all around the world will focus on two phenomena: economic growth and security dilemma. The economic development of Asia has promoted the interdependence and integration of interests among nations in this region, which constitute the resources of Asian security at the present stage. Meanwhile, many Asian countries feel insecure, which has little to do with a country’s size and strength. Though it is a large and powerful Asian state, China doesn’t have a better sense of security than smaller countries.

With a myriad of leftover conundrums, Asian countries have become interest-conscious as quickly as economic growth. Nonetheless, Asia is in dire need of an efficient security mechanism as well as common consensus to achieve it.

Asia has long been affected by external forces and in particular the US to a large degree. Washington has forged military alliances with several Asian countries and sometimes targeted a third party, making it all the more difficult for Asia to entirely cast off the specter of the Cold War. The US “rebalancing to Asia” policy conforms to its global strategy, inevitably increasing the cost of achieving Asian security.

Across the fairly intricate tapestry of Asian security, there is no difference between small and big powers in terms of security guarantee. Various messages further fuel contradictions and disorders in the region and add to strategic uncertainty.

Asian countries need to distinguish between realities and wishes and learn to compromise. It is unrealistic for some countries to quit counting on Washington in the short term but all Asian nations should recognize Uncle Sam cannot tide them over the security dilemma. Therefore, they should divert more attention to coordinating security concerns among themselves.

Security in Asia will eventually be realized through increasing mutual trust and cooperation in this region. We welcome external powers to play a constructive role in this process but object to their biased interference that will only increase the possibility of regional conflicts.

China is a rarely patient country in the world and spares no efforts to promote peace, which is a starting point and pillar for permanent peace in Asia. Resolution to safeguard peace may constitute the invisible bottom line despite numerous potential flashpoints in Asian security. – Global Times

Related:

 Video: China to advance CICA security role in Asia

 Shanghai, a traditional financial center in Asia, will witness a new security framework that could change the global political structure.
 

The Obama government will now be forever remembered not just as the “we spy” government but as the “we spy and lie” government. Spy charges expose U.S. cyber hegemony mentality

The United States has indulged in its cyber hegemony mentality again as it filed ungrounded commercial cyber espionage charges against five Chinese military officers.

Chinese Ambassador CuiTiankai on May 20 accused the United States of hypocrisy for charging five Chinese nationals of alleged commercial espionage, citing EdwardSnowden’s revelations of US spying operations worldwide.
Related posts:

A spokesperson for China’s State Internet Information Office on Monday published the latest data of U.S. cyber attack, saying that Chinese…

As the most notorious surveillance country, the U.S. indictment of Chinese military officers seems almost insolent in a worldstillreeli…

Video: China to advance CICA security role in Asia

“Chinese dream” speaks to the whole world, offers global inspiration


“Chinese dream” speaks to the whole world, offers global inspiration

When President Xi Jinping articulated a vision of prosperity, national rejuvenation and happiness for the people at the UNESCO headquarters in March, he added the best footnote yet to the notion of the “Chinese dream.”

Dream

No other words about China in recent years have captured the world’s attention and imagination as those two have.

The phrase, first mentioned during a speech by Xi two weeks after he was elected general secretary of the Communist Party of China (CPC) Central Committee in November 2012, has been echoed repeatedly by Chinese leaders and is considered a central mission of the new leadership.

The latest reaffirmation came on Sunday, when Chinese Vice President Li Yuanchao called on young people to work for the “Chinese dream” to integrate their personal dreams with the bigger dream of the Chinese nation’s revival.

Although the country might still be years, if not decades, away from living its dream for real, the Chinese dream has provided global inspiration.

Bulgarian President Rosen Plevneliev said in January during a visit to Beijing that he admired China for its great achievement of development and that he believed the Chinese dream of national rejuvenation will benefit the whole world as well as the Chinese people.

Asha-Rose Migiro, a former UN deputy secretary-general, also said last year that the “Chinese dream” resonated with the dream of Africa, as China and Africa can achieve common development through common efforts.

This is no accident and not difficult to understand. For one thing, the Chinese dream does not run contrary to the common aspirations worldwide, but is compatible with them.

Peace, prosperity, happiness and social stability, which are the essence of the Chinese dream, are also the most fundamental components of the shared pursuits of people worldwide.

In that sense, people across the world have all dreamt of the “Chinese dream” in their own way. It is no wonder that foreigners understand the notion upon first hearing it.

The Chinese dream also offers huge potential opportunities for cooperation and mutual benefit for other countries, both economically and politically.

China’s rapid economic growth has produced enormous “bonuses,” not only for the Chinese people, but also for the whole world.

According to figures from the National Statistics Bureau, China has topped the list of contributors to the global economy, with up to 19.2 percent of world economic growth coming from China in 2007, compared to only 2.3 percent in 1978.

China is not only the main engine of global economic growth, but also the defender of regional peace and stability.

Unlike certain troublemakers in the region, China has the resolve to create with Asian countries a peaceful and bright future for East Asia and the rest of the continent.

The realization of the Chinese dream does not entail fracturing the dreams of other countries. On the contrary, it helps them to realize their own dreams of peace and prosperity. – Xinhua

Related sources:

www.nihao-salam.com/news-detail.php?id=NTUyNg

China has provided SAP a broad playing field across our lines of business. According to the …

Related posts:

China may be poised to overtake the United States as the world’s top economy sooner than expected, according to one measure, bu…

‘Panther 911’ : Digistar is bullish on new central monitoring system (CMS)


Digistar_Pather 911Digistar chairman Tan Sri Mohd Zaman Khan (left), Inspector -Gener al of Police Tan Sri Khalid Abu Bakar and Lee during Pan ther 911’s official launching on April 25, 2014.

Information and communications technology (ICT) and property company Digistar Corp Bhd is bullish about the prospects of its newly-launched central monitoring system (CMS) called ‘Panther 911’.

Chief executive officer Datuk Wira Lee Wah Chong says the company targets 100,000 users for its hi-tech product in the first year.

A CMS is security-based system that includes aspects such as CCTV monitoring and alarms.

Digistar’s medium term goal is to secure a subscription base of 500,000 for its CMS in five years.

“The margins are good, about 20% to 30%. And this would be reflected from our current financial year (ending September 30, 2014) onwards,” he tells StarBizWeek.

“The first year may be slower than what we target but once our CMS gains visibility in the market, we expect a jump in take-up rate among business owners and individuals,” Lee says.

Digistar had spent RM5mil over the past two years to develop the CMS.

The company intends to use a multi-level marketing strategy to push the product into the market. “To incentivise the sales staff, they will get monthly a commission of 5% from the subscriptions they secure.”

In addition, the police force is also looking at the installation of closed-circuit television (CCTV) cameras at resorts and islands off Sabah’s east coast.

Last week, the police was reported to have asked Digistar to send them a proposal on installing the ‘Panther 911’ security system in Sabah.

The Inspector-General of Police Tan Sri Khalid Abu Bakar said to have the system linked directly to police stations would help security forces respond faster.

Khalid said the Eastern Sabah Security Command (Esscom) was planning to place security teams at 11 private resorts and islands that were the furthest away from Semporna and Lahad Datu. This was in light of recent killing and kidnapping events highlighted in the news.

If successful in this tie-up with the police, it would be Digistar’s first collaboration with the public sector for its CMS business. Right now, its target is on the mass market and commercial buildings.

Entering the Sabah market would not come as a surprise as Lee has always wanted to expand into Sabah and Sarawak.

That would be the second phase of Digistar’s security system business and the company estimates another RM5mil of investments for the expansion in the next two years. However, Lee notes that there needs to be better Internet connectivity in order for Internet-based surveillance systems to thrive in the country.

Digistar has a few competitors in the local CMS space.

But it seeks to differentiate itself by the attractive features of its system.

Digistar’s Panther 911 CMS system offers 24-hour monitoring services via an internet protocol-based platform. It can switch to run on 3G, 4G and LTE networks during power disruptions.

Banking on property sector

Lee says the company has plans to be among the top 100 companies in Malaysia in terms of market capitalisation in the next five years.

To do that, Lee says the company needs to further expand its property business. For Lee, property is Digistar’s next phase of growth as he opined that the growth trajectory for an ICT company has its boundaries.

“We are still focused on our ICT business but to achieve bigger goals, we will expand our property division,” he says. “We are looking for pockets of land around the Klang Valley now for small scale projects.”

Digistar already has a serviced apartment project in Malacca called The Heritage, with a gross development value of RM150mil. It is already 70% sold and is targeted to be opened this November.

Lee says the company intends to rent out the remaining 30% of apartments for recurring income.

“We plan to rent out like a hotel.

“The project will be a ‘condotel’, a combination of condominium and hotel,” he says.

Digistar is already speaking to hospitality partners to rope in for the management of the hotel component at The Heritage.

The company has also a 15-year concession for the construction and asset management of the Malaysian National Technology Advancement Centre in Alor Gajah, Malacca.

The project is a tie-up with the Works Ministry for the minstry to carry out training programmes for engineers and architects.

Its concession consists of RM174mil for the construction of facilities and infrastructure, and RM66mil for the provision of ICT and lab equipment.

Lee says the margins for this project would likely be in the double-digit range as well.

Digistar is also in talks to develop its telecommunications segment as it owns three individual licenses from the Malaysian Communications and Multimedia Commission to provide network and facilities services for five years.

Lee says discussions are on-going and declined to reveal any details.

All these efforts, says Lee, are aimed at steering the company back into profitability.

For the 2013 financial year (FY13), Digistar made a net loss of RM11mil compared to a profit of RM6mil in FY12.

The company had said that the loss was due to a higher operating cost, commencement of projects where revenue was yet to be recognised as well as the business expansion for its CMS and telecommunications divisions. Lee reckons that Digistar’s CMS as well as other initivatives would help turnaround the company and generate long-term recurring income.

Follow

Get every new post delivered to your Inbox.

Join 1,253 other followers

%d bloggers like this: