TITLE

Bloods opens door to security

PUB. DATE
February 2004
SOURCE
Engineer (00137758);2/6/2004, Vol. 293 Issue 7644, p7
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
No abstract available.
ACCESSION #
12305685

 

Related Articles

  • Picking up the Pace. Johne, Marjo // CMA Management;Mar2001, Vol. 75 Issue 1, p54 

    Focuses on biometrics, which work by scanning and digitally measuring physical traits and then comparing them against a database, and its application in airports to facilitate the pace of travel. Automated border crossing systems based on iris recognition technology; Potential of the optical...

  • Seeing-Eye Safeguarding.  // Fast Company;Mar2013, Issue 173, p32 

    The article describes a biometric technology introduced by mobile security company EyeVerify which uses an image of the eye taken with a cell phone camera to verify the phone user's identity, in lieu of a password, and explains how it avoids potential problems such as a user having pink eye.

  • Order of Fries with That Fingerprint?  // Tech & Learning;Apr2001, Vol. 21 Issue 9, p6 

    Focuses on POSitive ID, a student identification program being test-driven in three school districts in Pennsylvania. Integration of biometrics into the system; Other key features and specifications of the system; Impact of biometrics identification to system privacy and security.

  • Hand geometry getting a grip on apartment security. Guyette, James E. // Automatic I.D. News;May96, Vol. 12 Issue 6, p30 

    Describes a hand geometry identification system security officials at the Marshal Field Garden Apartment Homes in Chicago, Illinois are using to provide a safe environment for residents and staff. System features and capabilities; Benefits.

  • On the cards. Lee, Andrew // Engineer (00137758);4/30/2004, Vol. 293 Issue 7650, p9 

    No abstract available.

  • Fake ID? Fight it with technology.  // Security: Solutions for Enterprise Security Leaders;Jun99, Vol. 36 Issue 6, p62 

    Presents strategies for tackling the spreading problem of fake identification. Necessity of balancing acceptable level of risk and security; Use of chip cards and smart cards for high-level security environments; Incorporation of biometrics in computer chips.

  • Biometric Technology Is Featured at the 2006 Mock Prison Riot. McLaughlin, Tom // Corrections Today;Oct2006, Vol. 68 Issue 6, p48 

    The article focuses on the use of biometric technology at the 2006 Mock Prison Riot in West Virginia. The classroom workshops included a biometrics primer provided by the National Biometrics Security Project. Companies specializing in technologies to identify and verify individuals that took...

  • IDENTIFICATION.  // Security: Solutions for Enterprise Security Leaders;Feb2001, Vol. 38 Issue 2, p49 

    Presents news briefs related to automatic identification systems as of February 2001. Biometrics system used to secure National Basketball Association players during the 2000 Olympic Games in Sydney, New South Wales; Image Data LLC's survey of identity fraud in the United States; Features of...

  • THE NEW FACE OF SURVEILLANCE. Gallagher, Sean // Baseline;Nov2004, Issue 37, p26 

    This article discusses the advantages and disadvantages of using facial identification systems in business enterprises. Facial-recognition systems are, of course, only as good as the pictures they're based on and the people who use them. Software like Viisage's package tries to prevent "false...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics