What Are Biometrics?

The field of biometrics has recently become a hotbed of controversy and discussion between privacy groups, law enforcement agencies, and the general public at large. Recent advances in technology have enabled the stuff of science-fiction movies from Hollywood to become a reality. Learn more about the pros and cons of using biometric technology.

Featured Software Research:

Enterprise Phone Systems Comparison Guide

Internet protocol (IP) telephony is increasingly replacing traditional private branch exchange (PBX) technologies. But to replace their incumbent telephony systems, decision makers must look carefully at what’s available, what they’ve got, and what they need, before crafting a short list of candidates. This comparison guide from Focus Research is designed to help midsize and large enterprises do just that. Read More

Beginner's Guide to ERP

For companies considering implementing an enterprise resource planning (ERP) solution, this beginner’s guide describes what to look for, what benefits to expect, pitfalls to avoid, and other issues to consider, and includes a listing of leading vendors in various categories. Read More

Addressing the “Big Data” Issue: What You Need to Know

There is no doubt that big data, i.e., organization-wide data that’s being managed in a centralized repository, can yield valuable discoveries that will result in improved products and performance—if properly analyzed. Nonetheless, you must look before you leap. This white paper shows you what you need to know about big data, including the challenges big data presents, must-have practices to successfully manage a company’s big data, as well as the metrics to measure the ROI.  Read More

You may also be interested in these related documents:

Biometrics for Global Web Authentication: An Open Source Java/J2EE-Based Approach

  • Source: GE
  • Written By:
  • Published:
Recently, companies have been working on integrating biometric verification capabilities using open source single-sign-on techniques. The main idea behind this integration is to take advantage of the infrastructure provided by a Central Authentication Service (CAS) to offer single-sign-on Web authentication, while improving security beyond basic mechanisms based on login and password. Find out more. Read More

What Is Outsourceable and What Is Not

Product engineering outsourcing (PEO) has evolved over the years. The process, from initiation to the closing phase, vary depending on the product and on the provider. Still, practically every phase in product engineering is outsourceable—from ideas, design, and analysis, to simulation, conversion, and documentation; to prototyping, testing, production, and knowledge-based engineering. Find out more. Read More

Wetmetrics

The Internet is having an identity crisis. Long regarded as a powerful tool for cost reduction and service enhancement, the Internet is falling short of its promise because of the real and perceived threat of identity theft. Financial losses and insurance costs are mounting, as organizations struggle to protect their information perimeters and improve the strength of their authentication systems to ensure that the authorized user is present during the sign-in process. The widespread use and misuse... Read More
 
comments powered by Disqus