Leading Off

November 2002
Bank Technology News;Nov2002, Vol. 15 Issue 11, p12
Trade Publication
Reports on technologies adopted by banks to better establish the identity of their customers in the United States. Provisions of the Patriot Act and other national security laws influencing banks' decision to adopt various technologies; Bank spending on such technologies.


Related Articles

  • Keeping the Most Trusted Banking Channel Trustworthy. Tramontano, Bob // Bank Technology News;Jul2006, Vol. 19 Issue 7, p9 

    The article reports on how the National Security Agency or NCR keeps the automated teller machine (ATM) secured. The ATM is considered as the most trusted banking channel. However, NCR continuously works with financial institutions, ATM deployers and law enforcement agencies in the United States...

  • Assessing technology-driven firms. Hatch, Jim; McKay, Gord // Canadian Banker;Mar/Apr96, Vol. 103 Issue 2, p14 

    Reports that technology is a factor which bankers must deal with. Prospects in safe lending; Requirement for bank account managers to understand a company; Risks from the changes and use of new technology.

  • IN THE PIPELINE. Harris, Shane // Government Executive;Dec2002, Vol. 34 Issue 16, p60 

    Focuses on the anticipation of information technology (IT) firms in the U.S. regarding the federal government's expenditure on homeland security. Factors delaying government expenditure on homeland security; Possible benefits of federal expenditure on homeland security for IT firms; Areas under...

  • WHERE THE MONEY IS.  // Government Executive;Dec2002, Vol. 34 Issue 16, p68 

    Focuses on the efforts of information technology (IT) companies in the U.S. to tap business opportunities arising out of a federal expenditure on homeland security. Usefulness of corporate alliances for IT companies seeking business opportunities in the field of homeland security; Technology...

  • THE DATA MIGRATION CHALLENGE. Schwartz, Karen D. // Government Executive;Dec2002, Vol. 34 Issue 16, p70 

    Reports on the efforts of information technology (IT) companies in the U.S. in managing data of the homeland security agencies of the country. Requirement of time, dedication and perseverance by the task of identifying computer applications to manage the data; Tools available with software...

  • The Risks of a Networked Military. Harknett, Richard J. // Orbis;Winter2000, Vol. 44 Issue 1, p127 

    Details the benefit of a restructured military of the United States through an information technology-driven revolution in military affairs (IT-RMA). Argument on technological advances in the ability to process, organize and disseminate information; What revolution creates; Wrong response to...

  • Innovations Lead To Multi-Pronged Homeland Defense. Friedrich, Nancy // Microwaves & RF;Jun2007, Vol. 46 Issue 6, p33 

    The article discusses technological developments for homeland security in the U.S. as of June 2007. The author notes that after assessing the vulnerabilities of the U.S. to terrorist attacks, a landslide of funding for engineering companies was made available to develop new technologies to...

  • Process for science, technology appointments needs overhaul. Arias, Donya C. // Nation's Health;Dec2004/Jan2005, Vol. 34 Issue 10, p9 

    This article focuses on a U.S. report which recommended that immediately after each general election, the president or president-elect name a confidential assistant to the president for science and technology to give advice in the event of a crisis and to help quickly identify strong candidates...

  • National security in the information age. Gompert, David C. // Naval War College Review;Autumn98, Vol. 51 Issue 4, p22 

    Discusses the impact of the information revolution to the national security of the United States. Benefits from the information revolution; Role of information technology to the progress of world politics; Elaboration on how information technology widened the gap between Western and Eastern...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics