Physical Information Security

Physical Information Security

Physical Information Security remain separate entities by happenstance and by history. It typically involves physical controls such as protective barriers and locks, uninterruptible power supplies,…
Progressive Enhancement

Progressive Enhancement

This article talks about Progressive Enhancement, which is uses web technologies in a layered fashion that allows everyone to access the basic content and functionality…
Fault Tolerant Computer System

Fault Tolerant Computer System

Fault Tolerant Computer System is a very broad research area, it involves varieties of categorizations of techniques towards the effort to make system fault tolerant,…
Fault Tolerance

Fault Tolerance

Fault Tolerance is refers to a system’s ability to allow for failures or malfunctions, and this ability may be provided by software, hardware or a…
Vein Matching

Vein Matching

Vein Matching is a technique of biometric identification, which provide essential information regarding the blood supply to and from the tissues of the extremities and…
Speaker Recognition

Speaker Recognition

Speaker Recognition is a different technology than “speech recognition”, which recognizes words as they are articulated, which is not a biometric. It process relies on…
Retinal Scan

Retinal Scan

This article describe about Retinal Scan, which is performed by casting an unperceived beam of low-energy infrared light into a person’s eye as they look…
Keystroke Dynamics

Keystroke Dynamics

Keystroke Dynamics is a behavioral biometric, this means that the biometric factor is ‘something you do’. It is the detailed timing information that describes exactly…
Iris Recognition

Iris Recognition

Iris Recognition is an attractive technology for identity authentication for several reasons. It is a method of identifying people based on unique patterns within the…
Gait Analysis

Gait Analysis

Gait Analysis is a scientifically-based and technically-precise process. It is highly individualized, and reveals a lot about how you will hold up to training and,…
Fingerprint Recognition

Fingerprint Recognition

Fingerprint Recognition is one of the most well known biometrics, and it is by far the most used biometric solution for authentication on computerized systems.…
Facial Recognition System

Facial Recognition System

Facial Recognition System is commonly used for security purposes but are increasingly being used in a variety of other applications. It is a type of…
Load More