Study to Determine the Need for Innovative Technologies for Container Transportation System


Book Description

Projected growth in container traffic along with expected growth of commuter traffic in the region will cause more than significant increase in congestion, which will ultimately completely deteriorate performance of the transportation system in the region as well as performance of the transportation network around ports and within the port terminals themselves. In this situation port authority and port operators look for the ways to avoid problems that can emerge as the result of the traffic growth. One way to do so is to investigate the feasibility of using innovative transportation modes as the alternative to trucks and trains. This study will identify technologies that should be considered as candidates for container movement from and to the port, considering different travel distances. Economic analysis show whether these technologies are feasible or not, but it also evaluates external effects of the applied technology, such as pollution, reduction in congestion, socio-economic impacts and land use disruption.




Container Security


Book Description

To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if the deployment is secure? This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine appropriate solutions. Author Liz Rice, Chief Open Source Officer at Isovalent, looks at how the building blocks commonly used in container-based systems are constructed in Linux. You'll understand what's happening when you deploy containers and learn how to assess potential security risks that could affect your deployments. If you run container applications with kubectl or docker and use Linux command-line tools such as ps and grep, you're ready to get started. Explore attack vectors that affect container deployments Dive into the Linux constructs that underpin containers Examine measures for hardening containers Understand how misconfigurations can compromise container isolation Learn best practices for building container images Identify container images that have known software vulnerabilities Leverage secure connections between containers Use security tooling to prevent attacks on your deployment




Carrier Containerization Concept Study. Appendix


Book Description

Contents: Study Chronological History; Container Organizational Level Support Equipment Arrangement; Containerized Intermediate Level Support Equipment Arrangement; Stress Analysis of Carrier Container; Replies to Request for Container Handling Data.