site security Articles

  • Security projects

    Location: Belle Chasse, LA Unit: C-3315 and C-4315 Project: Flood, security and spill walls Conoco Phillips Alliance Refinery sits approximately 20 miles downriver (Mississippi) from the city of New Orleans. During 2005’s Hurricane Katrina, Conoco Phillips suffered massive damage, owing to hurricane storm surge and its resulting flooding. The six-month production downtime at Conoco ...


    By HESCO Bastion, Inc.

  • Secure handling of landfill gas

    Type     HOFGAS®- Sparky S Commissioning      2002 Site     Marley (GB) Situation The Marley landfill site in England is systematically degassed in order to meet the stringent local regulations. Marley is a proportionally small landfill site and does not deliver enough gas for energy generation. Consequently, the ...


    By Hofstetter BV

  • Homeland Security: Managing the Risks

    Untitled Document Following the terrorist attacks on the World Trade Center in New York City on September 11, 2001, the U.S. ...

  • GuideKeeper security concept of operation

    GuideKeeper aims at defining the Security Concept of Operation (SECOP) and promoting the deployment in Europe of open architecture platforms for the use of Unmanned Aerial Vehicles (UAVs) for border surveillance. Several UAV system concepts will be considered. Of particular interest to the GuideKeeper project will be a High Altitude Platform Security Surveillance Tower (HAP Tower) with real-time ...


    By Inderscience Publishers

  • Biowaste conversion technology for household food and energy security in the Philippines: appropriate on–site small–scale rice husk waste carbonisation

    Successful long–term domestic rice research to feed the rapidly increasing population in the Philippines facilitated increased production of the nation's staple from 11.786 MT in 1999 to 16.258 MT in 2008. The additional rice production has correspondingly increased the annual milled rice husk waste resource to around 3.4 MT - currently, a disposal problem for millers who often dump the waste in ...


    By Inderscience Publishers

  • Reisswolf looks to secure further expansion

    German data security service provider Reisswolf is celebrating its 21st anniversary this year. Already represented in 18 countries, the Euro 50 million-plus turnover business is setting its sights on expansion into Asia, America and Australia. In addition to providing data destruction services, Reisswolf has also developed substantial expertise in the field of archiving. Founded in 1985, German ...


    By Recycling International

  • Department of Homeland Security publishes list of chemicals for security rule

    On November 1st The Department of Homeland Security (DHS) posted on the Internet (www.dhs.gov) a Final Rule and Matrix List (Appendix A) identifying chemicals of interest (COI) that define coverage pursuant to Section 550 of the Homeland Security Appropriations Act of 2007 (Section 550). The rule was also published in the Federal Register on November 20th. This Final Rule establishes three ...

  • Ensuring food security: Key resources

    From nutrition to gender issues, Michael Hoevel scans the best online resources relating to food security. Addressing food security requires looking at multiple phenomena simultaneously — from hunger, livelihoods and ...


    By SciDev.Net

  • Homeland Security for Drinking Water Supplies

    As it has done with other jurisdictions, Congress has recently passed legislation aimed at protecting our nation's drinking water resources. Historically, water supply protection has been a high priority, including reservoir protection, continuous monitoring, and secure and redundant facilities to ensure an uninterrupted supply of drinking water. The Clean Water Act (1972), requires pollution ...


    By AECOM

  • Spolchemie site remediation and NanoRem field site application

    Site Remediation The Spolchemie site was chosen as one of the NanoRem case study sites, to test two types of nanoparticles (NPs) (zerovalent iron - nZVI and iron oxide NPs) for in situ remediation of BTEX (Benzene, Toluene, Ethylbenzene, and Xylenes) contamination. Nanoremediation was seen as an opportunity to enhance the in situ biodegradation of the BTEX contaminants and to reduce the ...


    By NANO IRON s.r.o.

  • Edina Secures Large Data Centre Rental

    In November 2008 Edina secured an order from Dornan Engineering to supply critical standby generation plant and fluid chillers for phase 1 of a new datacentre in Stockholm Sweden. Phase 1 would involve the complete fit out of a 400m2 data hall 1500 watts /m2. The data centre was scheduled to open in February and in order to facilitate the rapid build schedule Edina’s equipment needed to be ...

  • How to Keep Your SymphoniePRO Data Secure

    Data matters. The accuracy, consistency, and yes, safety of measurement data keep many wind developers and analysts up at night. Customers often ask about the digital and physical security of RNRG instruments, so I sat down with Michael Fisher, product manager for our wind resource assessment (WRA) line, to get answers to the most common questions. Q: Why is data security important? ...


    By Renewable NRG Systems

  • 5 Sobering realities about global water security

    Some people say that water is the oil of the 21st Century. If only water were that simple. Water is very complicated. It’s affected by large-scale issues like climate change and globalization. International commerce moves virtual water (the water it takes to grow or produce a product) from ...

  • Homeland Security – Is Your Facility High-Risk?

    On October 4, 2006 the President signed the Department of Homeland Security (DHS) Appropriations Act of 2007(the Act) which provided the DHS with the authority to regulate the security of high-risk chemical facilities.  In response to the Act, the U.S. Department of Homeland Security published an interim ...


    By SiteHawk

  • How PPE Makes Mining Industry Safe and Secure

    Work-related health and safety has always remained a cause for concern among industry experts, managers and workers. Many industries like energy, construction, fishing and farming report high incidence of casualties. The potential hazards that miners face daily in their workplace are plenty. Many of these hazards have progressive consequences that are not realized until too late. The effects ...


    By KWRS

  • RapidM2M: efficient, secure and stable M2M solutions

    A Machine-to-Machine technology combining low data volume with IT security and international data transmission at a internationally standardised service rate: That’s rapidM2M by Microtronics. Our blog article answers four questions about rapidM2M. What differentiates rapidM2M from other technologies on the market? How do system integrators benefit from ...

  • Global Site Decommissioning - Case Study

    Challenge: A global oil and gas company required final decommissioning at a former terminal and blending facility that had been idle for almost a decade. The 2.5 acre site, located in South Africa, required the removal of all above and below ground structures, underground utilities, process equipment, buildings, concrete slabs and foundations. The objective of ...


    By Antea Group - USA

  • UK report into security at Pirbright following foot-and-mouth disease outbreak

    Following the outbreak of foot and mouth disease (FMD) in Surrey on 3 August, the government asked the Health and Safety Executive (HSE) to lead an investigation into biosecurity issues at the Pirbright facility – a site occupied by the Institute of Animal Health (IAH) and also by two private companies called Merial Animal Health Ltd (Merial) and Stabilitech Ltd (Stabilitech). The ...

  • Why Department of Homeland Security is Interested in Clean-up Projects

    Responsibility for chemical security is shared among federal, state, and local governments, as well as the private sector.  The Department of Homeland Security (DHS) has issued Chemical Facility Anti-Terrorism Standards for any facility that manufactures, uses, stores, or distributes certain chemicals at or above a specified quantity.  Even if this is not its primary use, it includes ...

  • DHT-based security infrastructure for trusted internet and grid computing

    We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing ...


    By Inderscience Publishers

Need help finding the right suppliers? Try XPRT Sourcing. Let the XPRTs do the work for you