Home
 > Research and Reports > White Papers > What Are Biometrics?

What Are Biometrics?

Source: Voice Security Systems Inc.
The field of biometrics has recently become a hotbed of controversy and discussion between privacy groups, law enforcement agencies, and the general public at large. Recent advances in technology have enabled the stuff of science-fiction movies from Hollywood to become a reality. Learn more about the pros and cons of using biometric technology.


Featured publications:

Beginner's Guide to ERP
Source: Ziff Davis For companies considering implementing an enterprise resource planning (ERP) solution, this beginner’s guide describes what to look for, what benefits to expect, pitfalls to avoid, and other issues to consider, and includes a listing of leading vendors in various categories. Read More...
Sales Tax Compliance and the CFO: What automation means for risk management
Source: Avalara It’s time C-level executives take a closer look at how sales tax is managed within their organizations. This report highlights what finance and accounting professionals know (and don’t know) about managing sales tax, and more importantly, why risk of non-compliance is more important in this legislative climate. This report draws upon a recent study by Wakefield Research, which investigates what leading and emerging companies in the U.S. know about sales tax compliance. Read More...
What Is a PEO? An Introduction to the PEO Model and Its Benefits for Small and Medium-sized Businesses
Source: TriNet You entered into business to sell a product or provide a service and generate revenue doing what you do best. But human resources (HR) management is a necessity when you have employees. What could be better than taking a piece of your business and making it somebody else’s problem? This is what a professional employer organization (PEO) can provide and in this paper, you’ll learn about all the benefits partnering with one provides. Read More...


You may also be interested in these related documents:

Biometrics for Global Web Authentication: An Open Source Java/J2EE-Based Approach
Source: GE Recently, companies have been working on integrating biometric verification capabilities using open source single-sign-on techniques. The main idea behind this integration is to take advantage of the infrastructure provided by a Central Authentication Service (CAS) to offer single-sign-on Web authentication, while improving security beyond basic mechanisms based on login and password. Find out more. Read More...
What Is Outsourceable and What Is Not
Source: Xoriant Corporation Product engineering outsourcing (PEO) has evolved over the years. The process, from initiation to the closing phase, vary depending on the product and on the provider. Still, practically every phase in product engineering is outsourceable—from ideas, design, and analysis, to simulation, conversion, and documentation; to prototyping, testing, production, and knowledge-based engineering. Find out more. Read More...
Wetmetrics
Source: Queue Global Information Systems Corp. The Internet is having an identity crisis. Long regarded as a powerful tool for cost reduction and service enhancement, the Internet is falling short of its promise because of the real and perceived threat of identity theft. Financial losses and insurance costs are mounting, as organizations struggle to protect their information perimeters and improve the strength of their authentication systems to ensure that the authorized user is present during the sign-in process. The widespread use and misuse of passwords as authentication tokens is generally cited as a cause of the accelerating erosion of user confidence and the increasing incidence of identity theft. It is generally agreed that passwords are not enough. Much has been lost, however, in the race toward person-present authentication systems. While the application of passwords is fraught with risk, the introduction of complex authentication infrastructures and cumbersome end user technology has eroded usability and increased the cost of security dramatically. This paper describes a new authentication approach that retains the simplicity and low cost of passwords, while gracefully introducing as much person-present assurance as is required by the application. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.