|
       
|
| You search by tag - Security | |
| | | | | The futility of UNSC resolutions by Kourosh Ziabari Although the United Nations Security Council, which some politicians believe is one of the most undemocratic organizations in the world, voted in favor of a fourth round of sanctions against Iran over its uranium enrichment program, the global pub | | | Secure bullying by Thanos Kalamidas Yesterday Asa wrote an article about the events he and his friends had to deal with in the Helsinki Beer Festival. I’m not going to say anything about the organizers of th | | | Enforced Change, emerges from The Moscow Rules by Linda Lane For your consideration in terms of solving information management problems I refer you to the film "Ronin" staring Robert DeNiro, written by John David Zeik and David Mamet. If you consider it from the point of view of a capable informat | |
|
| | The Sad Saga of American Democracy by Dr. Habib Siddiqui It is said that Americans are the most schooled and least-educated nation on earth. This is a severe assessment when we reflect upon the fact that most of the best universities of our world are located in the USA, which graduate thousands of brigh | | | American National Security in the Age of Insecurity: 4/5 by Dr. Habib Siddiqui
| | | The cleric satellite by Thanos Kalamidas Please don’t tell me that anybody was surprised out there with the news that the dictators of Iran became space clerics nowadays and please don’t expect me to believe that it was a satellite to help them in better communication with Al | | | American Politics, Terrorism and Islam: Part 2 by Dr. Habib Siddiqui Who's a Terrorist? Over the years, America has evolved into the most dominant power in our planet, now much touted as the only super (or more appropriately, h | | | Design and Change in Highly Secure Corporate Settings: A brief reflection by Linda Lane The question posed was how do you design and develop in highly secure corporate settings, are there standards? What do you do when the corporate environment makes it too difficult to mee | | | Security for Secure Sites, HIPAA (US) by Linda Lane Experience in HIPAA compliance with Web applications The most basic risk factor in secure software applications is cost, and the s | | | Stolen Identity by Jack Wellman One thing that really disturbs me are those unseen predators, like thieves in the night, who refuse to make an honest living and instead steal another person’s name and identity, doing great harm to both. Even janitorial work or being a sani | | | A catastrophic mistake by Asa Butcher "Let us be clear about the scale of this catastrophic mistake - the names, the addresses and the dates of birth of every child in the country are sitting on two computer discs that are apparently lost in the post, and the bank account details | | |
|
|