40 resultados para Hardware IP Security
Resumo:
This article tells about the relationship between resource politics and security in international relations. Using the Mekong River Basin as its case study, the article examines the place of resource and development issues in attempts to develop regional institutions. The question of whether a resource development regime with apparently low productivity in terms of technical output, but high levels of resilience and longevity, should be considered a failure or not, is considered. This question is examined within the broader context of Southeast Asian politics during the First, Second, and Third Indochina conflicts as well as the post-cold war era. The article argues that survival and a capacity to change to meet the challenges of extreme broader events are clear evidence of regime success. From this standpoint, the article explores ways in which the Mekong resource regime is linked to more general concerns for political security and stability and may in fact reflect political concerns for subregional neighborhood maintenance.
Resumo:
Thomas & Tow's evaluation of the utility of human security is an important contribution to an ongoing debate about what security is and for whom security should be provided. In particular, the authors' engagement with the human security agenda is important given the centrality of this approach to recent attempts to rethink security. This article argues, however, that Thomas & Tow's approach to the human security agenda is problematic for two central reasons. First, their attempt to narrow security to make this approach amenable to state policymakers risks reifying the sources of insecurity for individuals everywhere. Second, the conception of human security they put forward appears largely inconsistent with the normative concerns inherent in the human security agenda.
Resumo:
This article argues that nuclear weapons serve no useful purpose in military calculations; moreover, their continued retention invites the dangers of further proliferation and of accidental use. They are thus defined here as obstacles to, rather than as facilitators of, international security. Seven reasons are presented to support this contention, including an assessment of the moral implications and the strategic limitations of nuclear weapons. Despite these limitations, and the recent commitments made by the nuclear weapon states to eliminate their arsenals, nuclear weapons remain central to the strategic doctrines of these states. Several reasons are put forward to explain why this retention continues, including the unchanging nature of strategic mindsets, the presence of vested interests, and now, in the case of the USA at least, a renewed reliance on nuclear weapons, regardless of how appropriate and effective such a strategy might be against emerging terrorist or `rogue state' threats.
Resumo:
We compared the quality of realtime fetal ultrasound images transmitted using ISDN and IP networks. Four experienced obstetric ultrasound specialists viewed standard recordings in a randomized trial and rated the appearance of 30 fetal anatomical landmarks, each on a seven-point scale. A total of 12 evaluations were performed for various combinations of bandwidths (128, 384 or 768 kbit/s) and networks (ISDN or IF). The intraobserver coefficient of variation was 2.9%, 5.0%, 12.7% and 14.7% for the four observers. The mean overall ratings by each of the four observers were 4.6, 4.8, 5.0 and 5.3, respectively (a rating of 4 indicated satisfactory visualization and 7 indicated as good as the original recording). Analysis of variance showed that there were no significant interobserver variations nor significant differences in the mean scores for the different types of videoconferencing machines used. The most significant variable affecting the mean score was the bandwidth used. For ISDN, the mean score was 3.7 at 128 kbit/s, which was significantly worse than the mean score of 4.9 at 384 kbit/s, which was in turn significantly worse than the mean score of 5.9 at 768 kbit/s. The mean score for transmission using IP was about 0.5 points lower than that using ISDN across all the different bandwidths, but the differences were not significant. It appears that IP transmission in a private (non-shared) network is an acceptable alternative to ISDN for fetal tele-ultrasound and one deserving further study.
Resumo:
Smart State is a Queensland Government initiative that recognises the central role of knowledge-based economic growth. In this context, the management of intellectual property (IP) within Queensland and Australian government research and development agencies has changed dramatically over recent years. Increasing expectations have been placed on utilising public sector IP to both underpin economic development and augment taxes by generating new revenues. Public sector research and development (R&D) management has come under greater scrutiny to commercialise and/or corporatise their activities. In a study of IP management issues in the Queensland Public Sector we developed a framework to facilitate a holistic audit of IP management in government agencies. In this paper we describe this framework as it pertains to one large public sector Agriculture R&D Agency, the Queensland Department of Primary Industries (QDPI). The four overlapping domains of the framework are: IP Generation; IP Rights; IP Uptake; and Corporate IP Support. The audit within QDPI, conducted in 2000 near the outset of Smart State, highlighted some well developed IP management practices within QDPI's traditional areas of focus of innovation (IP Generation) and IP ownership and licensing (IP Rights). However, further management practice developments are required to improve the domains of IP Uptake and Corporate IP Support.
Resumo:
The idea of “human security” is gaining attention among policy-makers and security analysts. Little scholarly attention has been given to the questions of why states accept (or reject) a human security agenda or how such an agenda is incorporated into policy practices. The article suggests that a human security approach is most likely to be applied when both humanitarian and national interests combine. Yet when states or organisations adopt a human security approach, they often misjudge the complex and long-term commitment required of such an approach. There is also the potential for such an agenda to be manipulated to justify questionable courses of action. These issues frame an analysis of six recent case studies.