Cargo represents a concern to U.S. national security. It was reported out of Washington, DC that in 2003 over 6 million cargo containers are entering the United States each year. After the terrorist attacks of September 11th, the security of this magnitude of cargo has become highlighted. The latest US Government response to this threat is the CSI: Container Security Initiative. CSI is a program intended to help increase security for containerized cargo shipped to the United States from around the world.
Tuesday, April 29, 2008
Cargo
Tuesday, April 22, 2008
Pre-Columbian Islamic contact theories
Pre-Columbian Islamic contact theories are theories which contend that medieval Muslim explorers from the Islamic world (specifically Al-Andalus, Africa or China) may have reached the Americas (and possibly made contact with the indigenous peoples of the Americas) at some point before Christopher Columbus' first voyage to the Americas in 1492. Proponents of these theories cite as evidence reports of expeditions and voyages conducted by Muslim navigators and adventurers who they allege reached the Americas from the late 9th century onwards
Tuesday, April 15, 2008
Prototyping
Prototyping is the process of quickly putting together a working model (a prototype) in order to test various aspects of a design, illustrate ideas or features and gather early user feedback. Prototyping is often treated as an integral part of the system design process, where it is believed to reduce project risk and cost. Often one or more prototypes are made in a process of iterative and incremental development where each prototype is influenced by the performance of previous designs, in this way problems or deficiencies in design can be corrected. When the prototype is sufficiently refined and meets the functionality, robustness, manufacturability and other design goals, the product is ready for production.
Tuesday, April 08, 2008
Object database
Friday, April 04, 2008
Database security
Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network opposed to being located within a demilitarized zone. Additional network security devices that detect and alert on malicious database protocol traffic include network intrusion detection systems along with host-based intrusion detection systems.