Andy (אברהם נפתלי) Blumenthal Leadership, Technology, Life, and Faith ✡
Pages
(Move to ...)
Home
Articles
Books
Facebook
LinkedIn
Links
Muck Rack
Qoshe
Slideshare
SoundCloud
Times of Israel
Twitter
YouTube
▼
Showing posts with label
Identification
.
Show all posts
Showing posts with label
Identification
.
Show all posts
February 21, 2018
From Malware To Malevolent People
›
So in virus protection on the computer, there are 2 common ways antivirus software works: 1) Signature Detection - There are known pa...
February 9, 2016
Cybersecurity Lost In Unknowns
›
Today unveiled is a new Cybersecurity National Action Plan . This in the wake of another Federal data breach on Sunday at the Departmen...
August 25, 2012
Choke Points to Checkpoints
›
This is some promising biometric technology from AOptix . Enrolling in the system is the first step and means just seconds of standing ...
August 19, 2011
Supercookies Are Super Invasive
›
You're alone sitting at the computer surfing the web, you're looking up health, financial, entertainment, shopping, and other per...
April 4, 2010
Advanced Biometrics for Law Enforcement
›
Homeland Security Today Magazine (March 2010) has an interesting article called “Biometrics on the Battlefield" about how t he American...
July 6, 2008
Biometrics and Enterprise Architecture
›
Biometrics is “the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.” (Wiki...
January 28, 2008
HSPD-12 and Enterprise Architecture
›
Homeland Security Presidential Directive 12, 27 August 2004, is a “Policy for a Common Identification Standard for Federal Employees and Con...
›
Home
View web version