Tuesday, April 29, 2008

Cargo

Cargo is a term used to denote goods or produce being transported generally for commercial gain, usually on a ship, plane, train, van or truck. Nowadays containers are used in most intermodal long-haul cargo transport.

Cargo represents a concern to U.S. national security. It was reported out of Washington, DC that in 2003 over 6 million cargo containers are entering the United States each year. After the terrorist attacks of September 11th, the security of this magnitude of cargo has become highlighted. The latest US Government response to this threat is the CSI: Container Security Initiative. CSI is a program intended to help increase security for containerized cargo shipped to the United States from around the world.

Tuesday, April 22, 2008

Pre-Columbian Islamic contact theories

Pre-Columbian Islamic contact theories are theories which contend that medieval Muslim explorers from the Islamic world (specifically Al-Andalus, Africa or China) may have reached the Americas (and possibly made contact with the indigenous peoples of the Americas) at some point before Christopher Columbus' first voyage to the Americas in 1492. Proponents of these theories cite as evidence reports of expeditions and voyages conducted by Muslim navigators and adventurers who they allege reached the Americas from the late 9th century onwards

Tuesday, April 15, 2008

Prototyping

Prototyping is the process of quickly putting together a working model (a prototype) in order to test various aspects of a design, illustrate ideas or features and gather early user feedback. Prototyping is often treated as an integral part of the system design process, where it is believed to reduce project risk and cost. Often one or more prototypes are made in a process of iterative and incremental development where each prototype is influenced by the performance of previous designs, in this way problems or deficiencies in design can be corrected. When the prototype is sufficiently refined and meets the functionality, robustness, manufacturability and other design goals, the product is ready for production.

Tuesday, April 08, 2008

Object database

In an object oriented database, information is represented in the form of objects as used in object-oriented programming. When database capabilities are combined with object programming language capabilities, the result is an object database management system (ODBMS). An ODBMS makes database objects appear as programming language objects in one or more object programming languages. An ODBMS extends the programming language with transparently persistent data, concurrency control, data recovery, associative queries, and other capabilities.

Friday, April 04, 2008

Database security

Database security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authenticated misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Database security is also a specialty within the broader discipline of computer security.

Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network opposed to being located within a demilitarized zone. Additional network security devices that detect and alert on malicious database protocol traffic include network intrusion detection systems along with host-based intrusion detection systems.