Smart Cards: More or 'Less'

Zalud, Bill
June 2008
Security: Solutions for Enterprise Security Leaders;Jun2008, Vol. 45 Issue 6, p80
Trade Publication
The article offers information about dual-technology or straight smart card use to store various information. Smart card can be contact cards and contactless cards in which contacts comprised of several gold-plated contact pads and contactless cards which only require close proximity to an antenna to a complete transaction. Other card is called memory card which contains electrically erasable programmable read-only memory (EEPROM).


Related Articles

  • Research of Engineering Spot Attendance and Employee Information Management Integration System. Lingjuan ZHANG // Advanced Materials Research;2014, Vol. 977, p472 

    To improve the efficiency of engineering spot attendance and employee management, a novel integrated management system is designed. The system uses a three-tier logical architecture design, which can be divided into user interface layer, business logic layer and data store layer. The realization...

  • Smartcard security concerns.  // Pulse;6/8/2006, Vol. 66 Issue 23, p3 

    The article reports on the misuse of smart cards in Great Britain. The National Health Service Information Technology (NHS IT) admits that misuse of smart cards in gaining access to Choose and Book and other IT systems could pose a threat to patient confidentiality. Circumstances such as...

  • Transmission possible. Wagner, Siobhan // Engineer (00137758);10/1/2007, Vol. 293 Issue 7733, p9 

    The article focuses on the contribution of turbo codes from the Swedish Defence Research Agency FOI for conducting deep-sea wreack investigations or naval defense mission in Great Britain. FOI researcher Earland Sangfelt states that such gadget allows transfer of information in the presence of...

  • A Bottom-Up Approach for the Representation and Continuous Update of Technology Architectures. Soares, João; Tribolet, José; Vasconcelos, André // Proceedings of the International Conference on Information Manag;2012, p253 

    In organizations where there are not any concerns about guiding Information Systems' (IS) development using Information Systems Architecture (ISA) models updated in a strict and automatic fashion, business requirements and external pressures frequently lead to an increasing gap between current...

  • The Ultimate Do-lt-Yourself Project: Disaster Recovery. Jepson, Kevin // Credit Union Journal;2/19/2007, Vol. 10 Issue 7, p11 

    The article reports on the introduction of a new hot site of the Clark County Credit Union (CCCU), which is said to be a first in disaster recovery technology for credit unions in the U.S. Roy Holmstrom, vice president for information systems at the CCCU, said that the system is in excellent...

  • An Information System for Simultaneous Consolidation of Inbound and Outbound Shipments. Bookbinder, James H.; Barkhouse, Carolynn I. // Transportation Journal (American Society of Transportation & Log;Summer93, Vol. 32 Issue 4, p5 

    This article discusses the nature and capabilities of a logistics information system (LIS) for the consolidation of inbound and outbound shipments. A logistics information system is a veritable necessity for competent materials management and distribution. A large number of organizations...

  • Improving process development with BETTER DATA. Ortloff, Dirk // Electronics World;Feb2010, Vol. 116 Issue 1886, p26 

    The article focuses on how engineers in the high-technology process development field can benefit from better data management. It states that new approaches for data management are necessary to address the challenges in fabrication process development and allow engineers to focus on developing...

  • Could cloud be the new tape? Whitehouse, Lauren // Storage Magazine;Dec2010, Vol. 9 Issue 11, p6 

    The article discusses the April 2010 Enterprise Strategy Group (ESG) Research Report, Data Protection Market Trends. The survey revealed that 20 percent of ESG research respondents use tap for their on-site backup process while 80 percent of the companies have transitioned to a disk-assisted or...

  • Looking Forward: Toward an Understanding of the Nature and Definition of IT Acceptance. Schwarz, Andrew; Chin, Wynn // Journal of the Association for Information Systems;Apr2007, Vol. 8 Issue 4, preceding p232 

    In the past two decades the Technology Acceptance Model (TAM) has successfully catalyzed a large number of studies related to IT usage or intentions toward that usage. However, we argue that the focus of these studies has been on a narrow aspect of usage (typically, extent or frequency of use)....


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics