Similar Articles |
|
Information Today February 20, 2014 |
Identity Security and Authentication Companies Join Forces HID Global, a provider of secure identity solutions, acquired Lumidigm, Inc., an authentication solutions company. |
PC Magazine October 28, 2003 |
The Lookout: A Fix for RFID Researchers at RSA Security's lab have come up with a technique they say will eliminate many of the privacy concerns surrounding the use of RFID (radio frequency identification) tags. |
U.S. Banker May 2011 Rob Garver |
Another Stab at Federated Identity The administration is exploring an identity ecosystem that envisions universal Internet log-in credentials for consumers. Will the prospect of more secure e-commerce win banks over to the idea? |
InternetNews June 28, 2010 |
White House Talks Up Online ID Plan New framework aims to better secure user identities to battle online fraud. |
Technology Research News August 11, 2004 Kimberly Patch |
Projector lights radio tags The Radio Frequency Identity and Geometry system can be used in industry, health care, homes, offices, and libraries -- and in games to integrate real and virtual objects. |
Information Today February 14, 2011 |
Mobile Access to USA TODAY Digital Content Available Through Microsoft Tagging Microsoft Tag is a mobile 2D bar code that lets users connect offline materials to the digital world. |
InternetNews September 20, 2010 |
Google Brings Two-Factor Security to Cloud Apps In an effort to bolster the security of its portfolio of cloud-computing applications, Google has added two-factor authentication as it courts the enterprise market. |
Information Today April 8, 2014 |
HID Global Reaches Settlements in Patent Lawsuits HID Global, a provider of secure identity solutions, settled its patent-infringement lawsuits against Apollo Security, Applied Wireless IDentifications Group, Inc., and Secura Key. |
InternetNews February 25, 2004 Susan Kuchinskas |
A Baby Step For RFID Privacy RSA Security has announced that it's working on RSA Blocker Tag, an anti-radio frequency identification technology. The proposed tag is designed to prevent readers from accurately scanning tags on goods and reading their electronic product codes, or EPCs. |
Entrepreneur May 2007 Amanda C. Kooser |
Tag, You're It You can be RFID-compliant, even on a tight budget. |
The Motley Fool July 26, 2010 Carl Bagh |
Wal-Mart's Use of RFID Tags -- a Privacy Issue or Supplier's Bane? Can Wal-Mart use them to gain another competitive edge? |
InternetNews February 23, 2006 Susan Kuchinskas |
Tagsys: The RFID Medium is the Message Tagsys introduced The-Package-Is-The-Tag, a system that incorporates an RFID "kernel" into the packaging itself. The system seeks to lower the costs and uncertainties of tagging individual items by separating the tag into two parts. |
Search Engine Watch December 5, 2002 Danny Sullivan |
Revisiting Meta Tags Follow up to October 2002 article about the demise of the meta keywords tag. |
PC World July 2003 Andrew Brandt |
Privacy Watch: Tracked by the Shirt on Your Back? Radio frequency technology has the potential to identify us all. |
InternetNews June 10, 2004 Susan Kuchinskas |
RFID Privacy Gap? The drive to place radio frequency identification tags on consumer products is relentless, but IT leaders say public policy on how to use and secure the information they'll provide is lagging behind. |
D-Lib January 2006 Guy & Tonkin |
Folksonomies: Tidying up Tags? Possibly the real problem with folksonomies in not their chaotic tags but that they are trying to serve two masters at once; the personal collection, and the collective collection. |
InternetNews January 12, 2005 Susan Kuchinskas |
RFID Tags a Booming Biz Research firm In-Stat says RFID tags will become the most far-reaching wireless technology since the cell phone, reaching $2.8 billion in four years. |
InternetNews February 15, 2006 Erin Joyce |
Sparks of Life (and Green) in Smart Cards More than 60 vendors - hardware, software and everything in between - are promising to line up better identity protection and authentication tools for businesses and consumers. |
CRM October 13, 2015 Oren Smilansky |
Sparkcentral Launches Secure Authentication for Social Customer Support Message encryption functions aim to facilitate trusted service interactions on Twitter and Facebook. |
D-Lib Jan/Feb 2010 Rose Holley |
Tagging Full Text Searchable Articles: An Overview of Social Tagging Activity in Historic Australian Newspapers August 2008 - August 2009 This article gives an overview of the public reaction to and utilization of the tagging facility in a full-text searchable collection, and provides statistics over a year's duration, observations on the use of tagging and suggestions for future developments. |
HBS Working Knowledge February 2, 2004 Sean Silverthorne |
RFID: The Promise (and Danger) of Smart Barcodes Thanks to Wal-Mart, we all have heard about radio frequency identification. Now RFID tags are set to pop up on everything from razor blades to cattle. |
PC Magazine November 5, 2003 |
RFID: Promise and Peril If you're wearing or carrying anything with an embedded RFID tag, you could conceivably be tracked wherever you go. |
D-Lib Mar/Apr 2009 Ding et al. |
Profiling Social Networks: A Social Tagging Perspective This article reports on an investigation of social tagging using data gathered from Delicious, Flickr and YouTube for the years 2005, 2006 and 2007. |
National Defense November 2009 Austin Wright |
How to Keep Track of Supplies Worldwide Omni-ID has released a passive RFID tag that can be detected by a reader more than 100 feet away, a feat considered exceptional for a tag that operates without a battery. |
Searcher September 2001 Richard Wiggins |
Behind the Screen - Microsoft's Windows XP Woes Mount: Smart Tags Feature Vulnerable? |
Vietnam August 2005 Mann, Maves & Holland |
Dog Tags Lost and Found: An Update Three scientists from the Joint POW/MIA Accounting Command (JPAC) reach some surprising conclusions about "the mystery of the dog tags." |
Bank Systems & Technology August 4, 2008 Orla O'Sullivan |
RFID Technology Comes of Age as Price is Right for Banks For assets tracking, radio tags are much easier and quicker to use than bar coding. |
JavaWorld August 2000 Simon Brown |
Encapsulate reusable functionality in JSP tags JavaServer Pages (JSP) are a great mechanism for delivering dynamic Web-based content. This article will show how easy it is to build, deploy, and use your own custom JSP tag, using the Servlet/JSP reference implementation, Tomcat. |
Bank Systems & Technology May 28, 2009 Maria Bruno-Britz |
U.S. Bank Pilots Multifunction Credit Card The AccelaPay Visa card acts as mag stripe, contactless and ID card. |
InternetNews December 13, 2006 Sean Michael Kerner |
Solaris Gets Secured Sun's Solaris 10 Unix operating system got its third major update, and it includes the long-anticipated Trusted Extensions, which replaces the legacy Trusted Solaris operating system. |
InternetNews January 20, 2006 Ed Sutherland |
RFID May See 'Explosive' Growth Although tiny in size, radio frequency identification tags expect huge growth over the next five years. |
IEEE Spectrum March 2007 Amal Graafstra |
Hands On How the author became one of the first do-it-yourselfers to have a radio-frequency identification (RFID) tag implanted under his skin and how it has changed his life. |
InternetNews November 8, 2005 Clint Boulton |
Liberty Needs to Know Who You Are The Liberty Alliance Project creates a group to help companies bring authentication into their folds. |
IEEE Spectrum February 2006 Paul McFedries |
Folk Wisdom How can nonprofessional taggers hope to create a WEb taxonomy that's as sophisticated as one that professional specialists would make? The answer lies in something called the architecture of participation: services get better as the number of users increases. |
CRM November 2014 Donna Fluss |
Is It Time to Move Your Contact Center to the Cloud? Make sure you understand the myths and realities. |
IndustryWeek September 22, 2010 |
No Slowdown for RFID Roughly 2.3 billion RFID tags will be sold in 2010, up from 1.9 billion in 2009. |
CRM September 17, 2015 Leonard Klie |
Salesforce Introduces SalesforceIQ, the Thunder Platform, and IoT Cloud at Dreamforce New Salesforce product launches bring data from multiple sources into common Salesforce apps. |
Entrepreneur February 2005 Gwen Moran |
Capture the Tag Are RFID tags in danger of being hacked? |
CRM September 2014 Maria Minsker |
Why Marketers Need a Tag Management System TMS solutions track customers' digital journeys so companies can automate appropriate actions. |
PC Magazine July 13, 2004 Bill Machrone |
RFID: Dogs! Cats! Guitars? Radio-frequency identity tags are all around us. |