Next Page: 10000

          U.S. officials weigh introducing biometric exit data rules for partners      Cache   Translate Page   Web Page Cache   
Federal officials are considering writing protections for the biometric data of travelers into the rules of the biometric exit program,...
          Lotte Card and Fujitsu launch biometric self-registration for payment system      Cache   Translate Page   Web Page Cache   
Lotte Card and Fujitsu recently debuted the world’s first “HandPay” self-registration system that allows consumers to register their biometrics without...
          Google researchers develop method for improved mobile facial recognition algorithm performance      Cache   Translate Page   Web Page Cache   
A team of Google researchers has developed a method of AI model selection that avoids the computational trade-off of slowness...
          Vetting security of mobile apps addressed in draft NIST special publication      Cache   Translate Page   Web Page Cache   
Because of the level of the abundant risks due to vulnerabilities in multitudes of mobile communications apps, a 50-page draft...
          U.S. visitor overstays motivating biometric exit continue gradual decline      Cache   Translate Page   Web Page Cache   
The number of suspected in-country overstays by U.S. visitors in 2017 declined to just under 607,000 from just under 629,000...
          IBM researchers develop biometric malware to prepare for AI vs. AI future      Cache   Translate Page   Web Page Cache   
A team of researchers from IBM’s cybersecurity division have created an artificially-intelligent, biometric malware called DeepLocker that can work with...
          Ipsidy raises $9.6 million in stock subscription and reports Q2 earnings      Cache   Translate Page   Web Page Cache   
Ipsidy has announced another significant increase in revenues in its recently-closed second quarter, along with a $9.6 million equity funding...
          Samsung Galaxy Note9 features iris biometrics tech by Princeton Identity      Cache   Translate Page   Web Page Cache   
Princeton Identity announced its patented iris recognition technology is featured in the Samsung Galaxy Note9. This follows the successful integration...
          Comment on Samsung unveils Galaxy Note9 with exclusive Fortnite access, plus Galaxy Watch by Film@11      Cache   Translate Page   Web Page Cache   
Well, so long as the biometric features can't be so easily fooled this time around. Previous efforts have been laughable at best. Nice to have the option to use a pen.
          Sr. Systems Engineer - Ideal Innovations, Inc. - Clarksburg, WV      Cache   Translate Page   Web Page Cache   
Duties: • Participate in analysis, design, development, and fielding of next generation Biometrics systems. • Provide identification/resolution of problems...
From Ideal Innovations, Inc. - Fri, 06 Jul 2018 22:40:11 GMT - View all Clarksburg, WV jobs
          COMPSAC 2018: Staying Smarter in a Smartening World      Cache   Translate Page   Web Page Cache   
Sorel Reisman reflects on the 42nd annual IEEE Computer Society COMPSAC conference held in Tokyo, Japan in July 2018. This article also includes an erratum for Experiments with Ocular Biometrics: A Practitioners Guideline (Z. Akhtar et al., vol. 20, no. 3, 2018, pp. 50-63; doi: 10.1109/MITP.2018.032501748).
          Behavioral Biometrics Market by Software & Services – 2023      Cache   Translate Page   Web Page Cache   
(EMAILWIRE.COM, August 10, 2018 ) According to a new market research report "Behavioral Biometrics Market by Component (Software & Services), Application (Identity & Access Management, Risk & Compliance Management, Fraud Detection & Prevention management), Deployment Model, Organization Size, and...
          Portfolio / IT Partner      Cache   Translate Page   Web Page Cache   
MA-Cambridge, RESPONSIBILITIES: Kforce's client in Cambridge, Massachusetts (MA) is looking for a Portfolio Manager/IT Partner to join their project. The key activities for this position include: Understand the processes, plans, objectives, drivers, and issues related to Biometrics and Data Management with emphasis on Clinical Trials, clinical data review, outsourcing to CROs and clinical data analytics Develop
          Bio metric Attendance System in Central Government Offices      Cache   Translate Page   Web Page Cache   
Bio metric Attendance System in Central Government Offices As per the information collected, Bio metric Attendance System are introduced in 5049 Central Government offices  as on July, 2018 GOVERNMENT OF INDIA MINISTRY OF PERSONNEL, PUBLIC GRIEVANCES AND PENSIONS LOK SABHA UNSTARRED QUESTION NO: 3631 ANSWERED ON: 08.08.2018 Bio-metric Attendance System 3631. DR. C. GOPALAKRISHNAN CHINNARAJ […]
          U.S. officials weigh introducing biometric exit data rules for partners      Cache   Translate Page   Web Page Cache   
Federal officials are considering writing protections for the biometric data of travelers into the rules of the biometric exit program,...
          Lotte Card and Fujitsu launch biometric self-registration for payment system      Cache   Translate Page   Web Page Cache   
Lotte Card and Fujitsu recently debuted the world’s first “HandPay” self-registration system that allows consumers to register their biometrics without...
          U.S. visitor overstays motivating biometric exit continue gradual decline      Cache   Translate Page   Web Page Cache   
The number of suspected in-country overstays by U.S. visitors in 2017 declined to just under 607,000 from just under 629,000...
          IBM researchers develop biometric malware to prepare for AI vs. AI future      Cache   Translate Page   Web Page Cache   
A team of researchers from IBM’s cybersecurity division have created an artificially-intelligent, biometric malware called DeepLocker that can work with...
          Samsung Galaxy Note9 features iris biometrics tech by Princeton Identity      Cache   Translate Page   Web Page Cache   
Princeton Identity announced its patented iris recognition technology is featured in the Samsung Galaxy Note9. This follows the successful integration...
          Sr. Systems Engineer - Ideal Innovations, Inc. - Clarksburg, WV      Cache   Translate Page   Web Page Cache   
Duties: • Participate in analysis, design, development, and fielding of next generation Biometrics systems. • Provide identification/resolution of problems...
From Ideal Innovations, Inc. - Fri, 06 Jul 2018 22:40:11 GMT - View all Clarksburg, WV jobs
          Trends and Controversies      Cache   Translate Page   Web Page Cache   
Performing covert biometric recognition in surveillance environments has been regarded as a grand challenge, considering the adversity of the conditions where recognition should be carried out (e.g., poor resolution, bad lighting, off-pose and partially occluded data). This special issue compiles a group of approaches to this problem.
          An Airline Scans Your Face. You Take Off. But Few Rules Govern Where Your Data Goes.      Cache   Translate Page   Web Page Cache   




A passenger in front of a facial recognition camera at Orlando International Airport. The program also operates at airports in Los Angeles, Detroit and Atlanta.CreditJohn Raoux/Associated Press


By Catie Edmondson
Aug. 6, 2018



WASHINGTON — The program makes boarding an international flight a breeze: Passengers step up to the gate, get their photo taken and proceed onto the plane. There is no paper ticket or airline app. Thanks to facial recognition technology, their face becomes their boarding pass.

“I would find it superconvenient if I could use my face at the gate,” said Jonathan Frankle, an artificial intelligence researcher at M.I.T. studying facial recognition technology. But “the concern is, what else could that data be used for?”

The problem confronting Mr. Frankle, as well as thousands of travelers, is that few companies participating in the program, called the Traveler Verification Service, give explicit guarantees that passengers’ facial recognition data will be protected.

And even though the program is run by the Department of Homeland Security, federal officials say they have placed no limits on how participating companies — mostly airlines but also cruise lines — can use that data or store it, opening up travelers’ most personal information to potential misuse and abuse such as being sold or used to track passengers’ whereabouts.

The data the airlines collect is used to verify the identity of passengers leaving the country, an attempt by the department to better track foreigners who overstay their visas. After passengers’ faces are scanned at the gate, the scan is sent to Customs and Border Protection and linked with other personally identifying data, such as date of birth and passport and flight information.

For its part, Customs and Border Protection has said it will retain facial scans of American citizens for no longer than 14 days. But the agency has said it cannot control how the companies use the data because they “are not collecting photographs on C.B.P.’s behalf.”


John Wagner, the deputy executive assistant commissioner for the agency’s Office of Field Operations, said he believed that commercial carriers had “no interest in keeping or retaining” the biometric data they collect, and the airlines have said they are not doing so. But if they did, he said, “that would really be up to them.”

But, Mr. Wagner added, “there are still some discussions to be had,” and federal officials are considering whether they should write in protections.

Privacy advocates have criticized the agency for allowing airlines to act as unregulated arbiters of the data.

“C.B.P. is a federal agency. It has a responsibility to protect Americans’ data, and by encouraging airlines to collect this data, instead they are essentially abdicating their own responsibility,” said Jennifer Lynch, a senior staff attorney with the Electronic Frontier Foundation, a digital rights nonprofit.

Harrison Rudolph, an associate at Georgetown Law’s Center on Privacy and Technology, voiced similar concerns in a report he helped write in December evaluating the agency’s use of facial scans.

“Are there privacy protections in the contracts that D.H.S. has reached with the airlines?” Mr. Rudolph said in an interview. “Do they require the disposal of any data collected? Do they require audits? Are there use limitations to ensure that travelers’ photos aren’t used in ways they don’t expect? Without any enforceable rules, it’s too easy for D.H.S. to break those promises.”

Mr. Wagner, however, defended the program and said it “builds upon the processes that have taken place for many years.”

“Airlines are already collecting a lot of information from a traveler and providing that to C.B.P.: the reservation data, the manifest,” he said.

But biometric data, including scans of passengers’ faces and fingerprints, is among the most sensitive, according to privacy experts, because unlike other means of identification such as a Social Security number, it cannot be changed.

The face is a particularly sensitive identifier because “if someone has a camera, they can identify you by your face,” Mr. Frankle said. “You can be recognized even if you have no idea you’re being recognized.”

The program, which currently operates through four major airlines in international airports in Los Angeles, Detroit, Orlando and Atlanta, is not mandatory for passengers. But the airlines — Delta, Lufthansa, British Airways and JetBlue — have reported that a majority of passengers participate.

It comes as facial recognition technology has become both more widespread and more closely scrutinized.

Companies such as Apple and Citibank have leveraged the technology, and still more — including casinos, music festival organizers and retailers like Walmart — have used it to track customers and shoplifters.

Amazon has recently drawn condemnation for providing facial recognition software to law enforcement agencies, whose use of the technology has caused privacy and civil liberties groups to voice concerns about overzealous surveillance.

Questions about the technology’s accuracy have also arisen. According to the Georgetown report, federal data shows that the system used by Customs and Border Protection incorrectly rejects as many as one in 25 travelers using valid credentials. It also cited studies that showed that facial recognition algorithms fail more frequently in correctly identifying women and people of color. The department said it does not track how many people using forged credentials manage to get through the system.

A privacy report by Customs and Border Protection published in June 2017 when the program began said federal officials would conduct a privacy evaluation within one year to ensure that airlines were complying with “required privacy protections.” An agency spokeswoman, Jennifer Gabris, said last month that the evaluation had not been completed because the program had not achieved “interim operating capability.”

Ms. Gabris did not respond to inquiries asking what privacy protections are required of participating companies; representatives for participating airlines also declined to respond to similar inquiries.

The companies have since been left to come up with their own policies that contain varying degrees of privacy assurances. In statements, the airlines stressed that the program was being tested in limited trials.

But while they provide passengers with generalized privacy policies, only one, JetBlue, specifically outlines how it will protect customers’ biometric data, an update made after inquiries from The New York Times.

Further complicating the situation is the fact that the companies share passengers’ data with the technology vendors they have contracted to create the infrastructure that collects the information and sends it to federal officials. Those vendors — Vision-Box, SITA and NEC Corporation — each have their own privacy policies with differing levels of accessibility.

“This is not something that is hard to get right if your hands are clean, which only invites suspicion if you don’t get it right,” Mr. Frankle said. “This isn’t a place where you’re innocent until proven guilty. We should be skeptical until they assure us they’re not going to use this data for anything other than convenience in ways that are legally binding.”

Some airlines like JetBlue have already expressed interest in using facial recognition technology to customize passengers’ experiences, such as allowing gate agents to recognize customers and even one day determining travelers’ mood.

Despite the privacy concerns, the Traveler Verification Service shows signs of expanding.

As part of a package devised to secure the nation’s borders, President Trump signed an executive order last year telling federal officials to speed up completion of a larger biometric entry-exit system that encompasses the program. And Congress authorized $1 billion in 2016 toward the measure.

The airlines say they hope to introduce the program within the next year to at least another half-dozen airports, and federal officials updated privacy documents last month to allow for cruise lines to participate in the program.

Two senators, Edward J. Markey, Democrat of Massachusetts, and Mike Lee, Republican of Utah, have urged the Department of Homeland Security to stop the expansion of the larger effort until their privacy concerns are addressed.

In a letter sent to the agency in December, the senators said that the system “appears not to have the proper safeguards to prevent the spread of this data to third parties or other government agencies.”




          MLB And NFL Fans Submit Their Faces And Fingerprints To Buy Food, Beer And Tickets      Cache   Translate Page   Web Page Cache   
By MassPrivateI If you still value your privacy, I urge you to stay away from major league sporting events. Yesterday, CLEAR biometrics announced that they...
          Offer - Biometric Participation Programming Identifiers at Fingerprintdubai.com - UNITED ARAB EMRIATES      Cache   Translate Page   Web Page Cache   
Biometric Fingerprint recognition are the eminent, measurable qualities used to check and verify people. Biometric participation programming identifiers are routinely programmed as physiological versus behavioral attributes. Physiological perspectives are related to the condition of the structure. Tests consolidate, yet are not obliged to exceptional finger impression, face recognition, Card Punch, hand participation, iris and smell aroma. Behavioral viewpoints are related to the case of behavior of an individual mate punching joining however not obliged to, composing time In and out logs, stride, and voice. A few experts have created the term behaviometrics to delineate the last class of biometrics. In UAE Dubai, Sharjah , Abu dhabi, Al AIN, Ras ul Khaima , Fujeirah and Ajman basically utilized Fingerprint devices framework as door Access Control for security and Time punching records.Contact us:Business Name /Contact Person: ABM INNOVATIVE FZECountry/Region: UAEStreet Address: Office # E2-102G-35City: SharjahState: HFZPostal Code: 51483Phone No: 055-1787172Email Address: info@fingerprintdubai.comWebsite: http://fingerprintdubai.com/
           MLB and NFL fans submit their faces and fingerprints to buy food, beer and tickets       Cache   Translate Page   Web Page Cache   

If you still value your privacy, I urge you to stay away from major league sporting events. Yesterday, CLEAR biometrics announced that they have installed biometric fingerprint scanners at Seattle’s CenturyLink and Safeco Fields concession stands. But the story does not end there. The video also revealed that MLS's Sounders FC team is using biometrics to spy on fans.


          Huami Corporation to Report Second Quarter 2018 Financial Results on August 20, 2018      Cache   Translate Page   Web Page Cache   

Earnings Call Scheduled for 8:00 a.m. ET on August 20, 2018

BEIJING, Aug. 9, 2018 /PRNewswire/ -- Huami Corporation ("Huami" or the "Company") (NYSE: HMI), a biometric and activity data-driven company with significant expertise in smart wearable technology, today announced that it will report its second quarter 2018 unaudited financial results before the market opens on Monday, August 20, 2018.

Management will hold a conference call at 8:00 a.m. Eastern Time on Monday, August 20, 2018 (8:00 p.m. Beijing Time on August 20, 2018). Listeners may access the call by dialing:

US (Toll Free):

+1-888-317-6003

International:

+1-412-317-6061

Mainland China (Toll Free):

400-120-6115

Hong Kong (Toll Free):

800-963-976

Hong Kong:

+852-5808-1995

Participant Elite Entry Number:

2203926

Participants should dial-in 10-15 minutes prior to the call and ask to be connected to the Huami Corporation earnings conference call.

A telephone replay will be available two hours after the call until August 27, 2018 by dialing:

US (Toll Free):

+1-877-344-7529

International:

+1-412-317-0088

Replay Passcode:

10123130


Additionally, a live and archived webcast of the conference call will be available at http://www.huami.com/investor

About Huami Corporation

Huami is a biometric and activity data-driven company with significant expertise in smart wearable technology. Since its inception in 2013, Huami has quickly established its global market leadership and recognition by shipping millions of units of smart wearable devices. In 2017, Huami shipped 18.1 million units of smart wearable devices. Huami has one of the largest biometric and activity databases in the global smart wearables industry.  Huami's mobile apps work hand in hand with its smart wearable devices and provide users with a comprehensive view and analysis of their biometric and activity data.  In addition to designing, manufacturing and selling smart bands and watches under its own Amazfit brand, Huami is the sole partner of Xiaomi, a leading mobile internet company and global consumer electronics brand, to design and manufacture Xiaomi-branded smart bands, watches (excluding children watches and quartz watches), scales and associated accessories.

For investor and media inquiries, please contact:

In China:
Huami Corporation
Grace Yujia Zhang
Tel: 86-10-5940-3255
E-mail:  ir@huami.com

The Piacente Group, Inc.
Ross Warner
Tel: +86-10-5730-6201
E-mail:  huami@tpg-ir.com

In the United States:
The Piacente Group, Inc. 
Brandi Piacente
Tel: +1-212-481-2050
E-mail:  huami@tpg-ir.com

Cision View original content:http://www.prnewswire.com/news-releases/huami-corporation-to-report-second-quarter-2018-financial-results-on-august-20-2018-300694669.html


          Cyber Security Manager - Leidos - Fairmont, WV      Cache   Translate Page   Web Page Cache   
The capability can receive multi-modal biometrics submissions to include iris, face, palm and finger prints from biometrics collection devices, which will...
From Leidos - Mon, 11 Jun 2018 16:15:00 GMT - View all Fairmont, WV jobs
          Cyber Security Engineer - Leidos - Fairmont, WV      Cache   Translate Page   Web Page Cache   
The capability can receive multi-modal biometrics submissions to include iris, face, palm and finger prints from biometrics collection devices, which will...
From Leidos - Fri, 25 May 2018 10:26:53 GMT - View all Fairmont, WV jobs
          Senior Project Manager (Within Biometrics) - Home based      Cache   Translate Page   Web Page Cache   
CK Clinical - Bedfordshire - company in the Pharmaceutical industry to be fully home based on a permanent basis. The Company: Our client is a long established specialist... and Statistics including regulatory requirements. The Benefits: Competitive salary, holiday, pension, working from home. Please note...
          ImageWare® Systems Reports 2018 Second Quarter and Six-Month Financial Results      Cache   Translate Page   Web Page Cache   
ImageWare_News-1-1500x840Update on Partners’ Biometric Sales and Marketing San Diego (August 9, 2018) – ImageWare® Systems, Inc. (OTCQB: IWSY), a leader in mobile and cloud- based, multi-factor, multi-modal biometric identity management solutions, reported financial results for the second quarter ended June 30, 2018. Q2 Summary of Results Revenue for the second quarter ended June 30, 2018 increased 78% to $1.9 million from $1.1 million in the second quarter of 2017. The increase reflects increased product revenue from the Veteran’s administration and several of our law enforcement customers. Gross profit for the second quarter was $1.6 million (84%) as compared with $810,000 (76%) in the second quarter 2017. The higher gross margins are due to higher software licensing revenue in the quarter. Net loss was $2.3 million in the second quarter compared with $2.5 million in the second quarter 2017. Six Months Summary of Results Revenue for the six-month period ended June 30, 2018 increased 31% to $2.6 million from $2.0 million in the same six-month period in 2017. Gross profit for the six months was $2.0 million (79%) as compared with $1.5 million (74%) in the same six-month period in 2017. Net loss was $5.9 million in the six months compared with $5.3 million in the same six-month period in 2017. Recently Announced Significant Events In Q2 we showcased our FDA-cleared pillphone® application for patient engagement and medication adherence using biometric authentication for the healthcare industry. In July we signed a distribution and integration partnership (including an initial order) with TwoFive, Inc., a leading Japanese security solutions provider – and opened a sales office in Tokyo. Also in July, through two partners, three financial institutions (Canada, New York, and Philadelphia) initiated multi-modal biometric security for their employees. Four Points Technology LLC received a multi-year $3.6 million award from the Veteran’s Administration ...
Read More

          Fingerprint Sensors Market Explore Future Growth 2018-2022 by Global Top Players- Cyber-SIGN, 3M Cogent Inc., Ekey Biometric Systems, IrScan, Dermalog Identification Systems GmbH      Cache   Translate Page   Web Page Cache   
ReportsWeb.com has announced the addition of the “Global Fingerprint Sensors Market Size Status and Forecast 2022”, The report classifies the global Fingerprint Sensors Market in a precise manner to offer detailed insights about the aspects responsible for augmenting as well as restraining market growth. According to Publisher, the Global Fingerprint Sensors Market is accounted for […]
          Homeland Security: More Than 600,000 Foreigners Overstayed U.S. Visas in 2017      Cache   Translate Page   Web Page Cache   

Trump wants a biometric entry-exit tracking system to solve the problem.

The post Homeland Security: More Than 600,000 Foreigners Overstayed U.S. Visas in 2017 appeared first on American Renaissance.


          Hands-On With Samsung's New Galaxy Note 9 and Galaxy Watch      Cache   Translate Page   Web Page Cache   
Samsung today hosted an event in New York where it unveiled its newest product updates, including the Galaxy Note 9, the Galaxy Watch, and the Galaxy Home speaker.

MacRumors attended Samsung's event and was able to get some hands-on time with Samsung's new line of flagship devices, which is worth checking out because Samsung's main product lineup is quite similar to Apple's with the introduction of the new Galaxy Home device.

Subscribe to the MacRumors YouTube channel for more videos.

Samsung's Galaxy Note 9 device comes just a few weeks ahead of when Apple plans to unveil its 2018 iPhones, and it gives us a look at the feature set Samsung is hoping will lure customers away from new Apple devices.

Unlike other Android smartphones, Samsung continues to eschew the notch, and the Galaxy Note 9 looks quite similar to the Galaxy Note 8 with small top and bottom bezels, an aluminum frame, a built-in iris scanner for biometric authentication, and a fingerprint scanner at the rear.


Samsung has tweaked the location of the fingerprint scanner, putting it underneath the rear camera instead of next to it, which often led to people touching the camera element in the previous device. Speaking of the camera, Samsung is using the same dual-camera dual-aperture setup as last year, with the addition of a new Intelligent Camera feature that optimizes camera settings for whatever you're taking a picture of.


The Galaxy Note 9 features a 6.4-inch AMOLED screen, a smidge bigger than the 6.3-inch screen in the previous device, and also smaller than the rumored 6.5-inch display Apple's "iPhone X Plus" device is expected to offer.

Inside, the Galaxy Note 9 uses a Snapdragon 845 processor and what Samsung describes as a watercooling system for superior game performance, and it comes equipped with an updated S Pen, a factor that has always set the Note line apart from the iPhone, as Apple's devices do not support its one and only stylus, the Apple Pencil.


The S Pen has been upgraded with Bluetooth, so it can be used as a remote for things like playing and pausing movies, playing slideshows, and taking selfies. An S Pen SDK is coming later this year that will allow developers to integrate S Pen functionality into their apps. Dock-free DeX support is included in the Galaxy Note 9, allowing it to be connected to an external display.


To compete with the HomePod and the Apple Watch, Samsung unveiled the Galaxy Home and the Galaxy Watch. Access to the Galaxy Home was limited and we couldn't get a good look at it, but it features a spaceship-like design with a U-shaped body that curves inward and three metal feet.

Samsung, like Apple, hyped the audio quality of the Galaxy Home on stage and demonstrated its integration with Bixby, Samsung's digital assistant and Siri competitor.

As for the Galaxy Watch, it features a circular display with a traditional watch-style face that also maintains the rotating bezel for control purposes. Like the Apple Watch Series 3, the Galaxy Watch features LTE so it is not reliant on an accompanying smartphone.


It has a battery that lasts several days, and like the Apple Watch, it offers a breathing guide, heart rate monitoring, support for 39 types of workouts, and automatic workout detection, a feature Apple is bringing to the Apple Watch in watchOS 5. Samsung is pairing the Galaxy Watch with a wireless charger that can charge a smartphone and the watch at the same time, which sounds a lot like Apple's still-missing AirPower device.


At its event, Samsung was also showing off the Galaxy Tab S4, its new iPad Pro competitor that was introduced last week. The 10.5-inch Galaxy Tab S4, which has a 16:10 AMOLED display, features DeX support, a Book Cover Keyboard, and an S Pen, along with a Snapdragon 835 processor, 4GB RAM, and a 7,300 mAh battery for 16 hours of battery life.


With today's announcements, Samsung's full fall 2018 product lineup is now available, and these are the devices that will directly compete with the products that Apple is expected to launch across the remaining months of 2018.

We're expecting three new iPhones, including a 5.8-inch OLED device that's a followup to the iPhone X, a 6.5-inch OLED iPhone that can be thought of as an "iPhone X Plus," and a lower-cost 6.1-inch iPhone with an LCD display. All three devices are expected to ditch the Home button and Touch ID in favor of Face ID enabled through a TrueDepth camera system.

Apple is also planning to launch new Apple Watch Series 4 models, which are said to have bigger displays, better batteries, and improved heart rate monitoring technology, plus there are revamped iPad Pro models in the works with slim bezels, no Home button, and Face ID support.

What do you think of Samsung's new product lineup, and how does it measure up to what Apple is rumored to be to putting out this fall? Let us know in the comments.

Tag: Samsung

Discuss this article in our forums


          New canting kit for extruded enclosure      Cache   Translate Page   Web Page Cache   

Enclosures manufacturer OKW has launched a case canting kit to optimize its SMART-TERMINAL extruded enclosures for table-top use. SMART-TERMINAL is designed for peripheral and interface equipment, communications, safety engineering, biometrics, medical and laboratory technology, healthcare, measurement and control engineering. The new case canting kit inclines SMART-TERMINAL by 12° to create an ergonomic reading and operating […]

The post New canting kit for extruded enclosure appeared first on EE World Online | A network of resources for engineers.


          Brihaspathi- Biometric Dealers in Hyderabad, Biometric Attendance System      Cache   Translate Page   Web Page Cache   
Looking for Best Biometric Attendance Cum Access Control System? Your Search ends here, we are the best Biometric Attendance system suppliers in Hyderabad.
          Carbon Nanotube-Based Fabric Could Double as Charger for Electronics      Cache   Translate Page   Web Page Cache   

Researchers already have developed clothing that can harvest and store power for recharging devices on the go. In doing so, they've mainly harvested energy from sources such as one’s own body motion or the sun. Now, researchers from the University of Cincinnati (UC), working with Wright-Patterson Air Force Base, are working to develop clothing for this purpose using a different type of power source: carbon nanotubes.

UC’s College of Engineering and Applied Science has a five-year agreement with the Air Force Research Laboratory to develop various solutions to improve military technology. Included are smart materials that can power electronics.

Spinning and Weaving

A team led by UC professors Vesselin Shanov and Mark Schulz has created carbon nanotubes that can be stretched over an industrial spool to be spun together into a thread that resembles spider’s silk—one of the strongest known natural materials. It can then be woven into textiles.

Those textiles can leverage properties of the carbon—such as a large surface area that is strong, conductive, and heat-resistant—to generate electricity to power electronics. In doing so, they can eliminate the need for personnel to carry often heavy batteries with them, researchers said in a UC publication.

“It’s exactly like a textile,” Shanov said in UC’s report. “We can assemble them like a machine thread and use them in applications ranging from sensors to track heavy metals in water or energy storage devices, including super capacitors and batteries.” 

Energy clothing from carbon nanotubes
University of Cincinnati (UC) graduate student Mark Haase stretches carbon nanotube fiber grown in the university’s Nanoworld Lab. Like spider silk, it's stretchy and strong. Researchers are using the material to develop clothing for the military that can be used as a power source. (Image source: UC)

Lightweight

Soldiers often carry equipment, such as lights, night-vision, and communications gear, which requires batteries comprising about 1/3 of the weight they carry. If some of that weight is removed by wearing energy-harvesting clothing, it’s a boon for the military, researchers said.

Indeed, scientists are eying carbon to replace existing materials in numerous applications. But researchers must first explore how to leverage the material’s properties optimally, Shanov said. “The major challenge is translating these beautiful properties to take advantage of their strength, conductivity, and heat resistance,” he said. 

Many Uses

Some of the new applications for carbon include replacing copper wire in cars and planes to reduce weight and improve fuel efficiency. Carbon also can be used to filter water, as well as provide diagnostic and other medical data through the development of new biometric sensors. Researchers also are eying carbon to replace polyester and other synthetic fibers—a notion integral to the UC team’s work to develop carbon-based energy-harvesting clothing that can recharge devices.

So far, what researchers have accomplished is a bit on the cost-prohibitive side to translate into mainstream textiles for consumer use. But one day, it could be a commercial technology, said Mark Haase, a graduate student who also is working on the project.

“We’re working with clients who care more about performance than cost,” Haase said in US’s publication. “But once we perfect synthesis, scale goes up considerably and costs should drop accordingly. Then we’ll see carbon nanotubes spread to many, many more applications,” he said. Currently, UC’s lab can produce about 50 yards of carbon nanotube thread at a time for its research, whereas large-scale textile machines need miles of thread.


Elizabeth Montalbano is a freelance writer who has written about technology and culture for 20 years. She has lived and worked as a professional journalist in Phoenix, San Francisco, and New York City. In her free time, she enjoys surfing, traveling, music, yoga, and cooking. She currently resides in a village on the southwest coast of Portugal.

 

Pacific Design and ManufacturingSAVE THE DATE FOR PACIFIC DESIGN & MANUFACTURING 2019! 
Pacific Design & Manufacturing, North America’s premier conference that connects you with thousands of professionals across the advanced design & manufacturing spectrum, will be back at the Anaheim Convention Center February 5-7, 2019! Don’t miss your chance to connect and share your expertise with industry peers during this can't-miss event. Click here to pre-register for the event today!

 


          Biometric System Engineer 2/3 - Northrop Grumman - Fairmont, WV      Cache   Translate Page   Web Page Cache   
Northrop Grumman is that kind of place! Northrop Grumman is committed to hiring and retaining a diverse workforce....
From Northrop Grumman - Tue, 17 Jul 2018 10:45:09 GMT - View all Fairmont, WV jobs
          Java Software Engineer 3/4 - Biometrics - Northrop Grumman - Fairmont, WV      Cache   Translate Page   Web Page Cache   
Northrop Grumman is that kind of place! Northrop Grumman is committed to hiring and retaining a diverse workforce....
From Northrop Grumman - Fri, 22 Jun 2018 10:36:43 GMT - View all Fairmont, WV jobs
          Military & Aerospace Electronics      Cache   Translate Page   Web Page Cache   
Military & Aerospace Electronics editorial covers topics such as Navigation/Guidance, Avionics, Missile Systems, Communication Systems, Electronic Warfare, Simulation/Training Systems, Unmanned Vehicles, Nanotechnology, Biometrics, Homeland Security, Shipboard Electronics, Reconnaissance Equipment and other relevant topics to military professionals in organizations such as the Department of Defense (DOD), NASA, FAA, CIA, FBI, NSA, Defense Contractors, Prime Contractors, Subcontractors/Integrators, Electronics Manufacturers, Defense Systems Vendors, and R&D, among others.

Request Free!

          Biometrics Project Manager      Cache   Translate Page   Web Page Cache   
Job Title: Biometrics Project Manager
Salary: On Application
Benefits: Excellent
Location: USA, United States Anywhere, US None
Company: SynteractHCR Deutschland GmbH
Posted: 09 August 2018
Expiry: 09 September 2018
Summary: Job Summary: The Biometrics Project Manager (PM) is responsible for the overall coordination and management of biometrics projects; from small single service projects (e.g., data management, etc) to large portions of multi-service, more-complex studies. The Biometrics PM leads technical teams, works with technical leads to identify/mitigate/escalate project issues and ensures solutions are implemented.
          Biometrics Project Manager      Cache   Translate Page   Web Page Cache   
Job Title: Biometrics Project Manager
Salary: On Application
Benefits: Excellent
Location: USA, United States Anywhere, US None
Company: SynteractHCR Deutschland GmbH
Posted: 09 August 2018
Expiry: 09 September 2018
Summary: Job Summary: The Biometrics Project Manager (PM) is responsible for the overall coordination and management of biometrics projects; from small single service projects (e.g., data management, etc) to large portions of multi-service, more-complex studies. The Biometrics PM leads technical teams, works with technical leads to identify/mitigate/escalate project issues and ensures solutions are implemented.
          Sr. Systems Engineer - Ideal Innovations, Inc. - Clarksburg, WV      Cache   Translate Page   Web Page Cache   
Duties: • Participate in analysis, design, development, and fielding of next generation Biometrics systems. • Provide identification/resolution of problems...
From Ideal Innovations, Inc. - Fri, 06 Jul 2018 22:40:11 GMT - View all Clarksburg, WV jobs
          Cyber Security Manager - Leidos - Fairmont, WV      Cache   Translate Page   Web Page Cache   
The capability can receive multi-modal biometrics submissions to include iris, face, palm and finger prints from biometrics collection devices, which will...
From Leidos - Mon, 11 Jun 2018 16:15:00 GMT - View all Fairmont, WV jobs
          Cyber Security Engineer - Leidos - Fairmont, WV      Cache   Translate Page   Web Page Cache   
The capability can receive multi-modal biometrics submissions to include iris, face, palm and finger prints from biometrics collection devices, which will...
From Leidos - Fri, 25 May 2018 10:26:53 GMT - View all Fairmont, WV jobs
          Biometric (Tenprint) Examiner - IDEAL INNOVATIONS INC - Clarksburg, WV      Cache   Translate Page   Web Page Cache   
Comparison of known palm prints to eliminate individuals or effect positive identifications; Preparation of fingerprints, palm prints, face images, and/or iris...
From Indeed - Wed, 08 Aug 2018 19:37:39 GMT - View all Clarksburg, WV jobs
          Associate Director, Clinical Data Standards Lead, Central Services      Cache   Translate Page   Web Page Cache   
PA-Collegeville, ROLE SUMMARY As part of the Data Monitoring and Management (DMM) group, an integral delivery unit within the Global Biometrics and Data Management (GBDM) organization, the Clinical Data Standards Lead is responsible for the integrity of clinical trial data standards. The Clinical Data Standards Lead will ensure the quality and consistency of clinical trial data standards to support the portfolio t
          Inside Lab100's 'clinic of the future': Mount Sinai's, cutting edge, new space to treat patients      Cache   Translate Page   Web Page Cache   

lab 100 mount sinai 8020 2

Welcome to the clinic of the future. At least that's how Dr. David Stark refers to Lab100, which sits in New York City's Upper East Side. 

Stark is the director and creator of Lab100, a joint effort between Mount Sinai's research institute and Cactus design studio which serves as a hybrid clinic and research lab. 

Lab100 gives patients a comprehensive health risk assessment and biometric screening. The goal is to empower patients to track their health over time and to learn how their behavior and lifestyle are impacting their health in a very tangible way.

"This comes from the notion that health is more than just the absence of disease, it's a whole continuum," Stark told Business Insider. Prevention and health upkeep is just as important as diagnosing, screening and treating disease. 

But an elevated physical check-up is just one product to come out of this design experiment. 

"Lab100 today, this location that you're in right now, this is still a prototype," said Stark. Beyond the functions of being a clinic and a data collection point for research, Stark sees Lab100 as this live-care environment that can be used to drive new product development — new diagnostics, new therapeutics, new tools for measuring health, and ultimately, new care models and new services and ways of practicing healthcare.

Business Insider took a tour of Mount Sinai's Lab100, dubbed by its creators as the "clinic of the future." Here's what you can expect if you schedule a visit.

SEE ALSO: Meet the 29-year-old who founded a company that's using technology to find treatments for diseases thought to be incurable

"In order for Lab100 to work, we had to put the patient at the center of the design process," said Noah Waxman, the founder of Cactus, a design studio which helped create the Lab100 space.

Waxman and the design team spent a lot of time building complex technology that can make a typically tedious doctor's appointment more appealing for patients. 

They also designed the space with the physician in mind. By creating better technology for data collection and data entry, which are usually manual and time-consuming, physicians can get back to having more face-to-face interactions with patients.

 

 



Lab100 went from concept to launch over a 10 month period. It has been in private beta, or internal testing mode since October 2017.

Despite the heavy use of technology to run the clinic, the design team made sure to incorporate it in an elegant and seamless way.

The stations currently in the clinic are permeable to change. 

"By definition, no one knows what the future of healthcare is, and neither do we. We made our best initial guess, recognizing that we're going to change based on the data we collect," said Stark. "It may turn out that we jettison some of these stations and put in additional stations."

The entire clinic is built like a stage set, explained Waxman. The panels are built on a easily-reconfigurable grid system so that machines and technology can be taken out and replaced without it looking like an after-thought.



Before stepping foot into the clinic, patients create profiles, complete a set of online surveys, and decide if they want to consent to research.

The surveys include information about your general medical history, nutrition, physical activity, mental health and sleep. These online surveys are used as an upgraded replacement for the usual clipboard surveys found in the doctor's office. 

When a patient consents to research, Lab100 de-identifies the data, and makes it available to select researchers internally to power new discoveries. 



See the rest of the story at Business Insider

          Frost & Sullivan: Holistic Enterprise Security remains paramount in light of SingHealth attack       Cache   Translate Page   Web Page Cache   

In light of the recent SingHealth cyberattack, affecting 1.5 million patients, enterprises today need to be prepared and cannot fall into complacency that similar attacks will not happen to their organization or that their current operations will not be impacted as a result of the breach.

With the growing proliferation in the number and vastly different endpoints accessing a company’s network, securing end-to-end control over the network is now more important than ever. Cyber attacks today are rapidly evolving to become more sophisticated, harder to detect, and able to bypass traditional security tools installed solely for meeting threats.

Frost & Sullivan believes that enterprises need to proactively evaluate their threat defense immediately in light of the possible impact from the attacks.

Personal identifiable information has been stolen and it is assumed that they may be readily available

As a result of the personal identity data theft, cyber criminals may already have access to this information and are using it, as evidenced by the fake SMS messages circulating phishing for more information.

According to Spike Choo, Director, ICT, Asia Pacific at Frost & Sullivan, such incidents are likely to occur more often given the widespread use of devices to connect to the Internet.

“Enterprises have to be prepared that the stolen information can potentially be used for unethical purposes such as identify theft or phishing attacks. To safeguard against such attacks, enterprises should implement additional verification and authentication checks before processing any customer requests,” Choo noted.

Once personal identifiable information has been compromised, enterprises that rely on such information for verification before processing customers’ request will have to be more stringent and implement additional safeguards or verification checks to prevent fraudulent transactions. Following the cyber attack, the Monetary Authority of Singapore has issued a circular to all financial institutions, directing them to immediately tighten their customer verification processes to include additional information for verification such as One-Time Password, PIN, biometrics, last transaction date or amount, etc.

Organizations need to be more proactive to manage their cyber risk

Even if they are not the direct targets of the attacks, they could still be vulnerable as the leaked information can be used against them. Given the sophisticated nature of possible threats, there is a need for enterprises and security vendors alike to utilize more intelligent and accurate methods in threat detection and remediation.

Frost & Sullivan believes that organizations today must adopt a holistic security strategy, comprising the right balance between security mindsets, tools and skill sets.

Pages


          Saudi Arabia: Innovation and Loss      Cache   Translate Page   Web Page Cache   

There are three main operators in Saudi Arabia: STC, Mobily and Zain. All three operators go through a strict approval process before being allowed to operate, and each one competes with the others to offer the best deals. Their services have all been tried and tested by both locals and travelers, so they can be trusted. According to OpenSignal’s connectivity report, Saudi Arabia’s coverage is extremely good around the main highways and developed areas, but it can suffer a great deal the more you head towards the deserts and remote regions. However, it isn’t just a local problem, it will happen on all phones and providers you use there. There are 2G, 3G and 4G plans available on all networks for unlocked GSM phones. Recently a 2.9 per cent drop in mobile users to 39 million has been projected, due to the implementation of economic reforms, which will push down the penetration rate to 123 per cent, compared with a 16 per cent year-on-year decline in 2017, where the penetration rate reached 127 per cent. 

STC as the largest player in the market holds somewhere between 52%-54% of the market, the rest is being shared between Zain and Mobily. Zain in its recent announcement highlighted that its subscribers base at the end of Q1-2018 stood at 8.4mn, depicting a market share of 18%. Leaving Mobily with a market share in the range of 28%to 30%.
STC (Saudi Telecom Company, mostly owned by the state) is the largest provider in Saudi Arabia, and it offers the best network coverage and Internet speeds.The latest STC report revealed that the number of mobile services users reached 40 million subscribers by the end of last year. Prices and packages are extremely competitive, and STC offers many deals and promotions to entice both locals and visitors. It started with LTE in 2010 and covers around 90% of population by 2015, which is only concentrated in a few towns on 1800 MHz (band 3) and 2300 MHz in TD-LTE (band 30).




Mobily, partly owned by Etisalat, is the 2nd provider in Saudi-Arabia. It still gives good coverage and speeds in populated areas. 4G/LTE is in city centers only: coverage check on 1800 in FD-LTE and 2600 MHz in TD-LTE. Mobily has said the introduction of the fingerprint registration rule led to an "erosion" of its customer base. The requirement was introduced last year by the Communications and Information Technology Commission, who instructed all SIM cards issued in Saudi Arabia to be linked to a fingerprint record held at the National Information Center.


Zain is the smallest provider in the country with 2G, 3G and 4G/LTE services on a GSM platform. Network coverage and Internet speeds are good around the main towns and cities, but as with all providers in Saudi Arabia, the signal will struggle as you head toward the desert regions. 4G is on 900, 1800 and 2100 MHz, all on FD-LTE, partly with three-band aggregation like in Jeddah. Zain offers the lowest rates in the Kingdom right now.

However Zain Saudi’s lost around 1.7 million subscribers in the first quarter of 2018, falling 17 percent to 8.4 million. The company said this was in line with a country-wide decrease and as a result of the government’s biometric identification project (which reduced the number of pre-paid SIMs to two per ID).



Zain has selected Ericsson to develop and test selected 5G and Internet of Things (IoT) cases. The new partnership will accelerate digitalization in the region, enabling rapid deployment of innovative services in the Internet of Things (IoT) in the coming years.
The 5G and IoT agreement covers live demonstrations and strengthens technical cooperation between the two companies and will ensure smooth 4G to 5G evolution across Zain’s networks.Bader Al Kharafi, Group CEO of Zain, said: 
“5G will open the door for new applications that will transform consumer behavior and industries. By introducing these new technologies, we will enrich the digital lifestyles of individuals and support the growth and development of businesses.”
In addition to the three main mobile operators, Saudi Operators also host couple of MVNOs. Lebara Mobile Saudi Arabia uses Mobily Network and Virgin Mobile KSA is hosted by STC.

Further Reading:

Related Posts:

          Inside Lab100's 'clinic of the future': Mount Sinai's, cutting edge, new space to treat patients      Cache   Translate Page   Web Page Cache   

lab 100 mount sinai 8020 2Business Insider/Jessica Tyler

Welcome to the clinic of the future. At least that's how Dr. David Stark refers to Lab100, which sits in New York City's Upper East Side. 

Stark is the director and creator of Lab100, a joint effort between Mount Sinai's research institute and Cactus design studio which serves as a hybrid clinic and research lab. 

Lab100 gives patients a comprehensive health risk assessment and biometric screening. The goal is to empower patients to track their health over time and to learn how their behavior and lifestyle are impacting their health in a very tangible way.

"This comes from the notion that health is more than just the absence of disease, it's a whole continuum," Stark told Business Insider. Prevention and health upkeep is just as important as diagnosing, screening and treating disease. 

But an elevated physical check-up is just one product to come out of this design experiment. 

"Lab100 today, this location that you're in right now, this is still a prototype," said Stark. Beyond the functions of being a clinic and a data collection point for research, Stark sees Lab100 as this live-care environment that can be used to drive new product development — new diagnostics, new therapeutics, new tools for measuring health, and ultimately, new care models and new services and ways of practicing healthcare.

Business Insider took a tour of Mount Sinai's Lab100, dubbed by its creators as the "clinic of the future." Here's what you can expect if you schedule a visit.

"In order for Lab100 to work, we had to put the patient at the center of the design process," said Noah Waxman, the founder of Cactus, a design studio which helped create the Lab100 space.

Business Insider/Jessica Tyler

Waxman and the design team spent a lot of time building complex technology that can make a typically tedious doctor's appointment more appealing for patients. 

They also designed the space with the physician in mind. By creating better technology for data collection and data entry, which are usually manual and time-consuming, physicians can get back to having more face-to-face interactions with patients.

 

 



Lab100 went from concept to launch over a 10 month period. It has been in private beta, or internal testing mode since October 2017.

Business Insider/Jessica Tyler

Despite the heavy use of technology to run the clinic, the design team made sure to incorporate it in an elegant and seamless way.

The stations currently in the clinic are permeable to change. 

"By definition, no one knows what the future of healthcare is, and neither do we. We made our best initial guess, recognizing that we're going to change based on the data we collect," said Stark. "It may turn out that we jettison some of these stations and put in additional stations."

The entire clinic is built like a stage set, explained Waxman. The panels are built on a easily-reconfigurable grid system so that machines and technology can be taken out and replaced without it looking like an after-thought.



Before stepping foot into the clinic, patients create profiles, complete a set of online surveys, and decide if they want to consent to research.

Lab100

The surveys include information about your general medical history, nutrition, physical activity, mental health and sleep. These online surveys are used as an upgraded replacement for the usual clipboard surveys found in the doctor's office. 

When a patient consents to research, Lab100 de-identifies the data, and makes it available to select researchers internally to power new discoveries. 




See the rest of the story at Business Insider

See Also:

SEE ALSO: Meet the 29-year-old who founded a company that's using technology to find treatments for diseases thought to be incurable


          Biometric SME - Tygart Technology, Inc. - Fairmont, WV      Cache   Translate Page   Web Page Cache   
Tygart supports the Department of Defense, Federal Bureau of Investigation, Intelligence Community, Federal Election Commission, Pension Benefit Guaranty...
From Tygart Technology, Inc. - Sat, 30 Jun 2018 03:01:38 GMT - View all Fairmont, WV jobs
          West Virginia and the Voatz “blockchain” voting system ― scaling and security ...      Cache   Translate Page   Web Page Cache   

In May, West Virginia ran a limited pilot programme using Voatz’ “blockchain” voting system, which Iwrote about in June ― it’s actually a mobile phone voting system, with a blockchain tacked on the side. This was for military people who were eligible to vote in Harrison and Monongalia Counties, but were stationed overseas.

West Virginia were sufficiently impressed to use the Voatz system again, for this November’s mid-term elections. This was reported on local WVNews sites at the end of July, but exploded when CNN reported it yesterday.

And my June post took off again, my Twitter mentions melted, and I was quoted in a Vanity Fair article today on the kerfuffle. So what’s going on here?


West Virginia and the Voatz “blockchain” voting system ― scaling and security ...
Why would you run a mobile phone vote?

Mobile phone voting sounds like an obviously terrible idea in all sorts of ways. But they need to solve a genuine problem:

“Think of a soldier on a hillside in Afghanistan or a sailor under the polar ice caps. They don’t have access to U.S. mail. Sometimes they’re in a classified area such as a nuclear sub or simply don’t have access to scanners, fax machines and that sort of thing. They do have access to the internet, mobile devices. It’s a tremendous solution to a very difficult problem and with West Virginia having the highest per capita volunteers in the U.S. military, we owe it to them.” “I’ve had voters who have overnighted to our jurisdiction and paid over $50 to do so, and it still didn’t get back to us by voting day.”

The voters are identified by biometrics. The Voatz system will be limited to military personnel on deployment ― people whose biometrics are thoroughly known and documented. It’s entirely optional, and soldiers can use a conventional paper vote instead if they want to.

The pilot programme in May wasn’t huge ― literally 11 voters from Monongalia County used the system. “I think all 11 military voters who used it in our county were pleased with it.”

Mobile phone voting: “a horrific idea”

Obviously, Voatz want to expand mobile phone voting. But the notion is controversial, to say the least:

“Mobile voting is a horrific idea,” Joseph Lorenzo Hall, the chief technologist at the Center for Democracy and Technology, told CNN in an email. “It’s internet voting on people’s horribly secured devices, over our horrible networks, to servers that are very difficult to secure without a physical paper record of the vote.” Marian K. Schneider, president of the election integrity watchdog group Verified Voting, was even more blunt. Asked if she thought mobile voting is a good idea, she said, “The short answer is no.”

If mobile phone voting can be usably secure at all, it will only be in a small and highly constrained system such as these pilot programmes.

How the blockchain bit works

The “blockchain” part of Voatz’ system is functionally superfluous ― it’s a ledger of the votes, kept on a four-node Hyperledger instance run entirely by the company. So it’s another single-user “blockchain” being used as a clustered database.

I must note that Voatz disagree with this characterisation, referring me to the FAQ on wvexperience.voatz.com (go to the page, click “Blockchain & Security” on the left):

Once the voter is verified, Election jurisdictions start the process by sending a qualified voter a mobile ballot. Contained in the mobile ballot are “tokens” ― think of them as potential votes ― which are cryptographically tied to a candidate or ballot measure question. The number of tokens a given voter receives is the same as the number of ovals he or she would have received on a paper ballot handed out at the voter’s precinct or sent through the mail. The voter makes selections on the Voatz app on their smartphone. As they make selections, it alters the tokens with their selections (like filling in a ballot oval). Overvotes are prevented, as each voter only receives a total number of tokens as they have potential votes. Once submitted, the votes for choices on the ballot are verified by multiple distributed verifying servers called “verifiers” or validating nodes. Upon verification, the token is debited (i.e. subtracted) from the voter’s ledger and credited (i.e. added) to the candidate’s ledger. The blockchain on every verifier is automatically updated and the process repeats as additional voters submit their selections. The Voatz blockchain is built using the HyperLedger blockchain framework. The minimum number of validating nodes used is 4. These get expanded to 16 for the pilot as needed depending on the anticipated number of participants. Additional scaling is planned for the future.

Though I still think this constitutes a private clustered database ― and certainly as long as Voatz control all verification nodes, or even if they control who gets to run a verification node.

The token arrangement seems bizarrely convoluted and gratuitous ― cryptographic tokens are widely used, work well, and they don’t need a blockchain. This still feels to me like implementing a naturally-centralised system on a blockchain because you want to say you used a blockchain.

The functional aspect of the blockchain bit is promotional:

Secretary of State deputy legal counsel and elections officer Donald Kersey said this means votes on Voatz become immutable and tamper proof, with records virtually impossible to crack.

Anyone reading this knows that none of that automatically follows from bolting a blockchain onto the side of your system.

There’s also a huge problem with the idea of recording the votes themselves on a permanent ledger. Joseph Lorenzo Hall in Vanity Fair asks you to “imagine that in 20 years, the entire contents of your ballot are decryptable and publicly available” ― rather than on pieces of paper that can’t be traced back to you personally.

Voatz in Utah, April 2018 ― 1400 voters go back to using paper

One thing that has to work with absolutely 100% reliability is voters being able to vote at all.

Tony Adams notes the 14 April 2018 Republican County Convention in Utah County, Utah, a caucus with about 1400 voters. They tried using Voatz, and it scaled so badly that they had to revert to using paper ballots.

Here’s some voter reviews:

This app is terrible. Good thing there were backup paper ballots … seriously awful Just wow! What an epic failure of an app. I had to sign up several times, validate, scan and wait wait wait for a “connection issue”. Me and the 1400 ish Delegates ended up doing paper ballots which made our convention go several hours overtime. After going through the lengthy and counter-intuitive verification process, I could not understand the directions and ended up calling them over the phone before the Utah County Republican precinct caucus meeting. I was exited to vote and still be with my kids. When voting was supposed to happen the server was over loaded. Eventually the app stopped working. I had to reinstall and reverify. Could not vote. The next day I come to find out my precinct gave up on the app and just used paper ballots instead. Major let down. Bye the way it also failed during many local caucus meetings a few weeks before. Out of 273 caucus meetings it only worked for three of them. Voatz’ security embarrassments

Election manipulation is, of course, huge news at the moment. So Voatz should have expected tremendous scrutiny of their security and technological transparency, in every detail.

It’s unfortunate they had an old server still up ― always remember to stop your old AWS instances!― for Kevin Beaumont to find at a glance:

The Voatz website is running on a box with out of date SSH, Apache (multiple CVSS 9+), php etc. Pop3 to the Internet, NTP, PHP3, Plesk from 2009. The database (on Azure) has an admin panel on port 8080, no SSL. I’m off to bed.


West Virginia and the Voatz “blockchain” voting system ― scaling and security ...
The United States needs some form of vetting process for online voting in elections. I’m a foreign dude with an avatar of a cowboy porg riding a porg dog on Twitter who appears to have done more investigation of the security implications of this than anybody. Bonkers, America.

If a startup (I’m sure they’re nice people btw) with 2m in funding approaches and says they have biometric security and Blockchain it still need independent vetting, at least to level a crab paste company would get a HR provider. There needs to be oversight here.

I can’t even find a Voatz CISO (or security person) to report stuff to. They have long unpatched boxes and weird services online, this wouldn’t pass a crab paste company pentest.

I used to work for a crab paste company with little to no IT budget, I wouldn’t have accepted this into production, but apparently the world’s most prosperous nation will.

Voatz say this was an old test site ― but leaving exploitable old servers up is a gateway to your new stuff. Did they check that nobody could get from the old server to the new servers? Are they in different Amazon VPCs?

Crucially, I find it unlikely that if you're running a Plesk from 2009 and a run of the mill poorly written PHP app on the user facing site that your security is all that great on the backend. There's at least someone in the org that is totally fine with an exploitable site.

― Keith Gable (@ZiggyTheHamster) August 7, 2018

Voatz claim the West Virginia election site was audited by Security Innovation , Ingalls Information Security , Hacker One , Comodo/HackerGuardian and Qualys SSL Labs.

Kevin asked them about this, and says that “One of the companies listed as providing a security audit says they did not provide a security audit.”

Hacker One just means Voatz have a bug bounty programme ― though I couldn’t find where they’ve listed it.

Qualys just provides a free SSL server test for any public website ― and Voatz do seem to mean the free SSL test, as the free test of their website was the link they provided to Vanity Fair as a sample of their security practices.

In fact, Voatz tweeted this quick SSL server test as evidence their servers had passed penetration tests.

Yes, you can do a quick self verification SSL test here to get a sample of that https://t.co/7GEZRPqdXX

We always appreciate constructive feedback to improve.

― Voatz (@Voatz) August 7, 2018

Summary

To be fair, the Twitter is probably just the social media person, having an absolutely terrible day ― not one of the technical people. But they need to get the techies on the job straight away.

The failure to scale in Utah is a serious problem, though overseas military voters are likely to be a small enough use case for the system to cope.

But mobile phone voting worries people a lot.

Voatz need to put out public reports ― as fully detailed and transparent as is feasible ― on every aspect of the entire system, as soon as they can.

Treat every scornful tweet today as a pointer to an opportunity to excel. A chance to restore confidence.

@Voatz ,
          Smartphone Voting Is Happening, but No One Knows if It's Safe      Cache   Translate Page   Web Page Cache   

When news hit this week that West Virginian military members serving abroad will become the first people to vote by phone in a major US election this November, security experts were dismayed. For years, they have warned that all forms of online voting are particularly vulnerable to attacks, and with signs that the midterm elections are already being targeted , they worry this is exactly the wrong time to roll out a new method. Experts who spoke to WIRED doubt that Voatz, the Boston-based startup whose app will run the West Virginia mobile voting, has figured out how to secure online voting when no one else has. At the very least, they are concerned about the lack of transparency.

“From what is available publicly about this app, it's no different from sending voting materials over the internet,” says Marian Schneider, president of the nonpartisan advocacy group Verified Voting. “So that means that all the built-in vulnerability of doing the voting transactions over the internet is present.”

And there are a lot of vulnerabilities when it comes to voting over the internet. The device a person is using could be compromised by malware. Or their browser could be compromised. In many online voting systems, voters receive a link to an online portal in an email from their election officials―a link that could be spoofed to redirect to a different website. There’s also the risk that someone could impersonate the voter. The servers that online voting systems rely on could themselves be targeted by viruses to tamper with votes or by DDoS attacks to bring down the whole system. Crucially, electronic votes don’t create the paper trail that allows officials to audit elections after the fact, or to serve as a backup if there is in fact tampering.

But the thing is, people want to vote by phone. In a 2016 Consumer Reports survey of 3,649 voting-age Americans , 33 percent of respondents said that they would be more likely to vote if they could do it from an internet-connected device like a smartphone. (Whether it would actually increase voter turnout is unclear; a 2014 report conducted by an independent panel on internet voting in British Columbia concludes that, when all factors are considered, online voting doesn’t actually lead more people to vote.)

Thirty-one states and Washington, DC, already allow certain people, mostly service members abroad, to file absentee ballots online, according to Verified Voting . But in 28 of those states―including Alaska, where any registered voter can vote online―online voters must waive their right to a secret ballot, underscoring another major risk that security experts worry about with online voting: that it can't protect voter privacy.

"Because of current technological limitations, and the unique challenges of running public elections, it is impossible to maintain separation of voters’ identities from their votes when Internet voting is used," concludes a 2016 joint report from Common Cause, Verified Voting, and the Electronic Privacy Information Center. That's true whether those votes were logged by email, fax, or an online portal.

Enter Voatz

Voatz says it’s different. The 12-person startup, which raised $2.2 million in venture capital in January, has worked on dozens of pilot elections , including primaries in two West Virginia counties this May. On a website FAQ , it notes, “There are several important differences between traditional Internet voting and the West Virginia pilot―mainly, security.”

Voatz CEO Nimit Sawhney says the app has two features that make it more secure than other forms of online voting: the biometrics it uses to authenticate a voter and the blockchain ledger where it stores the votes.

The biometrics part occurs when a voter authenticates their identity using a fingerprint scan on their phones. The app works only on certain Androids and recent iPhones with that feature. Voters must also upload a photo of an official ID―which Sawhney says Voatz verifies by scanning their barcodes―and a video selfie, which Voatz will match to the ID using facial-recognition technology. (“You have to move your face and blink your eyes to make sure you are not taking a video of somebody else or taking a picture of a picture,” Sawhney says.) It’s up to election officials to decide whether a voter should have to upload a new selfie or fingerprint scan each time they access the app or just the first time.

"We feel like that extra level of anonymization on the phone and on the network makes it really really hard to reverse-engineer."

Nimit Sawhney, Voatz

The blockchain comes in after the votes are entered. “The network then verifies it―there’s a whole bunch of checks―then adds it to the blockchain, where it stays in a lockbox until election night,” Sawhney says. Voatz uses a permissioned blockchain, which is run by a specific group of people with granted access, as opposed to a public blockchain like Bitcoin. And in order for election officials to access the votes on election night, they need Voatz to hand deliver them the cryptographic keys.

Sawhney says that election officials print out a copy of each vote once they access them, in order to do an audit. He also tells WIRED that in the version of the app that people will use in November, Voatz will add a way for voters to take a screenshot of their vote and have that separately sent to election officials for a secondary audit.

To address concerns about ballot secrecy, Sawhney says Voatz deletes all personal identification data from its servers, assigns each person a unique but anonymous identifier within the system, and employs a mix of network encryption methods. “We feel like that extra level of anonymization on the phone and on the network makes it really really hard to reverse-engineer,” he says.

Experts Are Concerned

Very little information is publicly available about the technical architecture behind the Voatz app. The company says it has done a security audit with three third-party security firms, but the results of that audit are not public. Sawhney says the audit contains proprietary and security information that can’t leak to the public. He invited any security researchers who want to see the audit to come to Boston and view it in Voatz’s secure room after signing an NDA.

This lack of transparency worries people who’ve been studying voting security for a long time. “In over a decade, multiple studies by the top experts in the field have concluded that internet voting cannot be made secure with current technology. VOATZ claims to have done something that is not doable with current technology, but WON'T TELL US HOW,” writes Stanford computer scientist and Verified Voting founder David Dill in an email to WIRED.

Voatz shared one white paper with WIRED, but it lacks the kind of information experts might expect―details on the system architecture, threat tests, how the system responds to specific attacks, verification from third parties. “In my opinion, anybody purporting to have securely and robustly applied blockchain technology to voting should have prepared a detailed analysis of how their system would respond to a long list of known threats that voting systems must respond to, and should have made their analysis public,” Carnegie Mellon computer scientist David Eckhardt wrote in an email.

Ideally, experts say, Voatz would have held a public testing period of its app before deploying it in a live election. Back in 2010, for example, Washington, DC, was developing an open-source system for online voting and invited the public to try to hack the system in a mock trial. Researchers from the University of Michigan were able to compromise the election server in 48 hours and change all the vote tallies, according to their report afterward . They also found evidence of foreign operatives already in the DC election server. This kind of testing is now considered best practice for any online voting implementation, according to Eckhardt. Voatz’s trials have been in real primaries.

"West Virginia is handing over its votes to a mystery box."

David Dill, Stanford University

Voatz's use of blockchain itself does not inspire security experts, either, who dismissed it mostly as marketing. When asked for his thoughts on Voatz’s blockchain technology, University of Michigan computer scientist Alex Halderman, who was part of the group that threat-tested the DC voting portal in 2010, sent WIRED a recent XKCD cartoon about voting software. In the last panel, a stick figure with a microphone tells two software engineers, “They say they’ve fixed it with something called ‘blockchain.’” The engineers’ response? “Aaaaa!!!” “Whatever they’ve sold you, don’t touch it.” “Bury it in the desert.” “Wear gloves.”

“Voting from an app on a mobile phone is as bad an idea as voting online from a computer,” says Avi Rubin, technical director of the Information Security Institute at Johns Hopkins, who has studied electronic voting systems since 1997. “The fact that someone is throwing around the blockchain buzzword does nothing to make this more secure. This is as bad an idea as there is.”

Blockchain has its own limitations, and it’s far from a perfect security solution for something like voting. First of all, information can be manipulated before it enters the chain. "In fact, there is an entire industry in viruses to manipulate cryptocurrency transactions before they enter the blockchain, and there is nothing to prevent the use of similar viruses to change the vote," says Poorvi Vora, a computer scientist and election security expert at George Washington University.

She adds that if the blockchain is a permissioned version, as Voatz’s is, “It is possible for those maintaining the blockchain to collude to change the data, as well as to introduce denial of service type attacks.”

Sawhney pushes back against this last critique, telling WIRED that the blockchain verifiers in the Voatz system is a collection of vetted stakeholders such as Voatz itself, election officials, nonprofit voting auditors, and politicians.

And even though the transaction is through an app rather than a browser, Vora says previously identified risks of internet voting remain. "Both the browser and the app run on the operating system underneath, and both, hence, inherit the vulnerabilities that go with relying entirely on software," she says.

Sawhney admits the concern about malware on a person’s device is legitimate but thinks that creating a program to manipulate votes would be so hard as to be impractical. “It’s theoretically possible, if that malware had been specifically written to intercept votes passing, to reverse-engineer our application, break all our keys, specifically modify if somebody marks oval A change it to oval B, and then bypass the identifier and send it to the network, but that is so, so hard to do in real time," he says. "It is possible, but we haven’t found a way to do it.” He adds that the app checks the phone for malware before downloading on a device, though he admits it could be possible for malware to go undetected.

The role of facial recognition in authenticating voter identities is another thing that concerns experts. Schneider worries that there could be ways to trick that technology using videos available elsewhere on the internet, for instance. And Vora notes that facial-recognition technology has knownracial biases that could affect who even is able to access Voatz.

Sawhney tells WIRED that Voatz has people manually check the facial-recognition authorization. This is possible at the moment but could become an issue if the technology were to be introduced to a wider electorate, as Voatz states on its website is the ultimate goal. In fact, Voatz has already encountered a scaling problem. When Utah GOP voters tried to use the app during their caucus in April, many couldn’t get it to work. You can read about many voters’ experience in bad reviews of Voatz they left in Apple’s App Store. Sawhney tells WIRED that the issues stemmed from voters attempting to download the app and authenticate themselves minutes before polls closed, which didn’t give Voatz enough time.

Though Voatz has answers for much of the criticism it has faced this week, none of its responses are likely to convince security experts that the smartphone voting app is ready for November. At the very least, the security world's reaction to Voatz underscores how important transparency is in the rollout of any new voting system. “West Virginia is handing over its votes to a mystery box,” Dill says.

But election officials in West Virginia are enthusiastic about the app. “They used it in the primary in a couple of the other counties to do a test drive, and they said it was wonderful,” says Kanawha County Clerk Vera McCormick, who oversees voting in the state capital of Charleston and plans to allow the 60 overseas military members registered in her county to use Voatz to vote. “We're excited and my understanding is the security is wonderful, so we'll find out.”

More Great WIRED Stories How to make millions charging prisonersto send an email Bioengineers are closer than ever tolab-grown lungs It's never too late tobe a reader again The danger of invisible government deeds How to secure your accounts withbetter 2FA Looking for more? Sign up for our daily newsletter and never miss our latest and greatest stories
          Sr. Systems Engineer - Ideal Innovations, Inc. - Clarksburg, WV      Cache   Translate Page   Web Page Cache   
Duties: • Participate in analysis, design, development, and fielding of next generation Biometrics systems. • Provide identification/resolution of problems...
From Ideal Innovations, Inc. - Fri, 06 Jul 2018 22:40:11 GMT - View all Clarksburg, WV jobs
          Medical Assistant      Cache   Translate Page   Web Page Cache   
MI-Kentwood, A-Line Staffing is now hiring Medical Assistant for Biometric Screenings in Kentwood, MI! This Medical Assistant position would be full time / 40+ hours per week. Medical Assistant Highlights: Pay Starts at $15/hr Full time! 5am-1pm Monday, Tuesday, Thursday, Friday 6pm-11pm Wednesday NO SUNDAYS! Variable Saturdays Medical Assistant for Biometric Screenings Description: Provide clinical support to
          Inside Lab100's 'clinic of the future': Mount Sinai's cutting edge, new space to assess patients      Cache   Translate Page   Web Page Cache   

lab 100 mount sinai 8020 2

Welcome to the clinic of the future. At least that's how Dr. David Stark refers to Lab100, which sits in New York City's Upper East Side. 

Stark is the director and creator of Lab100, a joint effort between Mount Sinai's research institute and Cactus design studio which serves as a hybrid clinic and research lab. 

Lab100 gives patients a comprehensive health risk assessment and biometric screening. The goal is to empower patients to track their health over time and to learn how their behavior and lifestyle are impacting their health in a very tangible way.

"This comes from the notion that health is more than just the absence of disease, it's a whole continuum," Stark told Business Insider. Prevention and health upkeep is just as important as diagnosing, screening and treating disease. 

But an elevated physical check-up is just one product to come out of this design experiment. 

"Lab100 today, this location that you're in right now, this is still a prototype," said Stark. Beyond the functions of being a clinic and a data collection point for research, Stark sees Lab100 as this live-care environment that can be used to drive new product development — new diagnostics, new therapeutics, new tools for measuring health, and ultimately, new care models and new services and ways of practicing healthcare.

Business Insider took a tour of Mount Sinai's Lab100. Here's what you can expect if you schedule a visit.

SEE ALSO: Meet the 29-year-old who founded a company that's using technology to find treatments for diseases thought to be incurable

"In order for Lab100 to work, we had to put the patient at the center of the design process," said Noah Waxman, the founder of Cactus, a design studio which helped create the Lab100 space.

Waxman and the design team spent a lot of time building complex technology that can make a typically tedious doctor's appointment more appealing for patients. 

They also designed the space with the physician in mind. By creating better technology for data collection and data entry, which are usually manual and time-consuming, physicians can get back to having more face-to-face interactions with patients.

 

 



Lab100 went from concept to launch over a 10 month period. It has been in private beta, or internal testing mode since October 2017.

Despite the heavy use of technology to run the clinic, the design team made sure to incorporate it in an elegant and seamless way.

The stations currently in the clinic are permeable to change. 

"By definition, no one knows what the future of healthcare is, and neither do we. We made our best initial guess, recognizing that we're going to change based on the data we collect," said Stark. "It may turn out that we jettison some of these stations and put in additional stations."

The entire clinic is built like a stage set, explained Waxman. The panels are built on a easily-reconfigurable grid system so that machines and technology can be taken out and replaced without it looking like an after-thought.



Before stepping foot into the clinic, patients create profiles, complete a set of online surveys, and decide if they want to consent to research.

The surveys include information about your general medical history, nutrition, physical activity, mental health and sleep. These online surveys are used as an upgraded replacement for the usual clipboard surveys found in the doctor's office. 

When a patient consents to research, Lab100 de-identifies the data, and makes it available to select researchers internally to power new discoveries. 



See the rest of the story at Business Insider

          Sr. Systems Engineer - Ideal Innovations, Inc. - Clarksburg, WV      Cache   Translate Page   Web Page Cache   
Duties: • Participate in analysis, design, development, and fielding of next generation Biometrics systems. • Provide identification/resolution of problems...
From Ideal Innovations, Inc. - Fri, 06 Jul 2018 22:40:11 GMT - View all Clarksburg, WV jobs
          IH21 - Biometric Health Screener      Cache   Translate Page   Web Page Cache   
MO-Monett, INTEGRATED HEALTH 21, LLC is a national screening company and provider of on-site health and wellness screenings and flu shot clinics for corporations throughout the United States. We are currently looking for Health Professionals with excellent customer service and communication skills to work on a PRN, as needed, basis in various cities across the country. Health screens typically run 4-8 hours
          Windrush citizens still waiting for cases to be resolved      Cache   Translate Page   Web Page Cache   

Home Office told one woman to seek charity help to feed her child while waiting for news

Windrush citizens who have had their lives turned upside down by a harsh government policy that wrongly targeted them over their immigration status are still waiting for their cases to be resolved, despite a government pledge to process them in two weeks.

Dozens of those referred to the Windrush taskforce have yet to receive news about their citizenship and biometric residence permits.

Continue reading...
          The one way Samsung’s Galaxy Note 9 is worse than the Note 8      Cache   Translate Page   Web Page Cache   
The long wait for Samsung's Galaxy Note 9 to be made official is finally over. The company on Thursday hosted a massive Unpacked press conference at the Barclays Center in Brooklyn, New York to take the wraps off of its flagship smartphone for the second half of 2018. Not that it was much of a surprise since literally everything there was to know about the phone had leaked in the months leading up to yesterday's event, but the Galaxy Note 9 is without question one of the hottest smartphones in the world right now. It offers a sleek, albeit familiar design and cutting-edge specs, as well as the most stunning smartphone display the world has ever seen. On top of that, the Note 9 actually sports a few compelling new features that its predecessor lacked. That seems like it should be obvious, but it's one area where the Galaxy S9 and Galaxy S9+ fell short earlier this year; not only did they look almost exactly like their predecessors, but they didn't really have any exciting new features that might warrant an upgrade. Well, the same cannot be said of the Galaxy Note 9. Whether or not the phone's novel new features are appealing to you, it can at least be said that the phone does have novel new features. In fact, the Galaxy Note 9 is better in every way than its predecessor. Well... almost every way. Though the appear to be nearly identical from afar, the hot new Galaxy Note 9 is a big improvement compared to last year's Note 8. It features slightly smaller overall dimensions, so it fits a bit better in the hand. Despite the smaller size, however, Samsung managed to fit in a larger 6.4-inch display compared to the 6.3-inch screen on the Note 8. Even more impressively, the Note 9 packs a massive 4,000 mAh battery into that tinier housing. The Galaxy Note 8 from 2017 only has a 3,300 mAh battery. The Galaxy Note 9 has better cameras, more powerful processor options, and more available storage than the Note 8. In fact, the Galaxy Note 9 is the first Samsung smartphone with up to 1TB of storage, since the high-end model comes with 512GB of internal storage and it also supports a 512GB microSD card. Samsung's new Note 9 supports faster LTE data speeds, it ships with a newer version of Android, it supports more advanced biometric authentication, and the high-end model has more RAM than the Note 8. And yet despite all of that, and despite everything else we've mentioned, there's one annoying way that the new Galaxy Note 9 is worse than last year's Galaxy Note 8. Here's everything you need to know in a single tweet: https://twitter.com/UniverseIce/status/1027720024474050560 Want a closer look at that image? Here you go: Is this a deal-breaker? No, it shouldn't be for most people. But in 2018 we're moving toward the all-screen smartphone design of our dreams. People want narrower bezels. They want practically no bezels at all. And yet as you can see in the image above, the Galaxy Note 9 actually has wider bezels on the sides of the screen than last year's Galaxy Note 8. The real shame of it is Samsung's "Infinity" display design is supposed to make it look like the sides of the screen curve down around the edge of the phone, like an infinity pool where all you see is water with no border. The Galaxy Note 9 actually takes a big step backward in terms of achieving the design goal that Samsung's own marketing name suggests.
          Java Software Engineer 3/4 - Biometrics - Northrop Grumman - Fairmont, WV      Cache   Translate Page   Web Page Cache   
Experience with JavaScript, EXT-JS, AngularJS, JQuery. Remember when you were eager about getting to work because of the excitement of the challenge, the...
From Northrop Grumman - Fri, 22 Jun 2018 10:36:43 GMT - View all Fairmont, WV jobs
          Java Software Engineer 3/4 - Biometrics - Northrop Grumman - Fairmont, WV      Cache   Translate Page   Web Page Cache   
Experience with JavaScript, EXT-JS, AngularJS, JQuery. Remember when you were eager about getting to work because of the excitement of the challenge, the...
From Northrop Grumman - Fri, 22 Jun 2018 10:36:43 GMT - View all Fairmont, WV jobs
          Cyber Security Manager - Leidos - Fairmont, WV      Cache   Translate Page   Web Page Cache   
The capability can receive multi-modal biometrics submissions to include iris, face, palm and finger prints from biometrics collection devices, which will...
From Leidos - Mon, 11 Jun 2018 16:15:00 GMT - View all Fairmont, WV jobs
          Cyber Security Engineer - Leidos - Fairmont, WV      Cache   Translate Page   Web Page Cache   
The capability can receive multi-modal biometrics submissions to include iris, face, palm and finger prints from biometrics collection devices, which will...
From Leidos - Fri, 25 May 2018 10:26:53 GMT - View all Fairmont, WV jobs
          Biometric (Tenprint) Examiner - IDEAL INNOVATIONS INC - Clarksburg, WV      Cache   Translate Page   Web Page Cache   
Comparison of known palm prints to eliminate individuals or effect positive identifications; Preparation of fingerprints, palm prints, face images, and/or iris...
From Indeed - Wed, 08 Aug 2018 19:37:39 GMT - View all Clarksburg, WV jobs
          Internet security, encrypted messaging and privacy projects win ​Facebook grants      Cache   Translate Page   Web Page Cache   
Facebook grants go to researchers developing answers to Facebook account hijacking, internet outages, and behavior-based biometrics.
          Axis Bank introduces iris authentication for Aadhaar-based transactions      Cache   Translate Page   Web Page Cache   

Mumbai: Axis Bank has become the first bank in the country to introduce Iris Scan Authentication feature for Aadhaar-based transactions through its micro ATM tablets.

This service, which requires a customer to scan their iris on a tablet, will boost the bank's financial inclusion efforts by making Aadhaar authentication process hassle-free and offering easier access to digital banking for consumers especially in the rural parts of the country.

Micro ATMs completely eliminate the requirement of debit cards, passwords, PINs, and user IDs, and empower consumers to avail banking services using only their Aadhaar numbers and biometrics (iris scan/fingerprint scan). The bank has deployed highly secure iris powered micro ATM tablets which are STQC certified and UIDAI compliant registered devices with completely integrated iris sensors.

Iris scan technology is completely contactless and provides up to 98.2 per cent authentication success rate (as per study conducted by the International Centre for Biometric Research) and offers an edge over other prevalent biometric modes.

"We are delighted to introduce the iris authentication feature for Aadhaar-based transactions. We have built this feature in a way that improves transaction experience over micro ATMs by making Aadhaar authentication process hassle-free and simple for our customers, especially senior citizens and those from far-flung rural regions who often face rejections while using other biometric modes. We feel that the iris scan technology has profound potential in authentication space in the future, as India continues its push to becoming a less-cash society," said Rajiv Anand, Executive Director - Retail Banking, Axis Bank.

The process of transaction through iris scan is very simple. Customer need to select the desired service (funds transfer, cash withdrawal) and feed-in their Aadhaar numbers in the micro ATM. Next, they will have to choose 'IRIS' as the desired mode of authentication. Verification will be done by scanning the eyes of the customers through the tablet's iris sensor camera in 3-5 seconds. The transaction will be completed after the biometric details are verified from the UIDAI database.

Axis Bank is presently running a pilot program for its customers at eight branches in rural segment largely covering areas of Punjab, Haryana, Gujarat and Andhra Pradesh. The Bank is also exploring the application of iris-based Aadhaar authentication for varied services such as loan processing, insurance, eKYC account opening and others, most likely extending to the semi-urban and urban regions as well.


          Creating the Whole Child Amidst Technology Disruption With Rex Bookstore      Cache   Translate Page   Web Page Cache   
In this growing age of technology, different kinds of technologies are prevalent everywhere. You can see varieties of screens, devices and gadgets just by walking around. Technology is part of our daily lives - from digital billboards, smartphones with biometrics, machines that activate transport, to apps that add efficiency to how we do things, everything seems possible in this hi-tech age. Even when it comes to work and education everything is turning digital.

Creating the Whole Child Amidst Technology Disruption With Rex Bookstore
Creating the Whole Child Amidst Technology Disruption With Rex Bookstore

As we move through the age of one-click and one-tap access, not only did efficiency and productivity increased, but everything is happening too fast as well. The growth brought by the innovation in technology made significant changes in the way our education is shaped. Having mere academic knowledge is not enough to survive in this fast-growing world. Skills outside the four corners of the room are what the future needs.

REX Bookstore, known for being a champion of holistic, 21st-century learning, took great concern as to what would be the most excellent way to build the generation in this age of technology. With the knowledge that most, if not all jobs are now becoming digital because industries attempt to shift to a more cost-efficient way of running their operations through maximizing technological platforms, Rex Bookstore knew that mastery of academic subjects is not enough, and new skill sets is necessary to be gained.

Educational institutions and other stakeholders should place enough focus on equipping our students and learners with the necessary training to foster creativity and critical thinking. Especially now that talks about the risk that humans will be entirely taken over by machines in the future. As of 2010, top 10 jobs started to shift to technology and digital related careers. More than 50% of the jobs today expected to be replaced by artificial intelligence as well. With all these advancements occurring, we must be able to cope up well. Having creativity and critical thinking skills are the key to the future generation, for these qualities would be the most useful as we face a rapidly evolving world.

To further nurture these qualities for the future generation, Rex Bookstore adopted the Whole Child Approach as guidance in developing their offerings. The Whole Child Approach was first developed by an organization called ASCD. It aims to transition learning from just narrowly focusing in academic achievements to education that gives holistic connection towards fulfilling the success of young learners through long-term development and guidance.

As ASCD’s official partner in the Philippines, REX Book Store has been actively creating programs, offering a symphony of learning solutions to assist not just learners, but parents and institutions with the vision of transforming today´s classrooms into a future-ready learning environments.

Rex Bookstore helps in molding the future generation for them to be able to live in the new ecosystem we are currently building at present. They aim not just to use technology as a present advantage, but as something beneficial in the future.

At present, everything we see is a reflection of emerging and converging technologies- each offering new horizons of access to limitless information, possibilities to improve efficiencies, share data, build communities, and boost creativity and freedom. One notable innovation in today’s technology is having the existence of Internet. It gave a whole new meaning to instant access. Physical distance is no longer a barrier to exchange both in communication and information

With all this advancement we are experiencing, it is clear that we have a bright future ahead of us. Even so, since everything is now easily accessible, the existence of dirty data and fake news have been increasing in number. Everyone can create content and make it viral as much as everyone could have access to information and then share it as one believes it to be true. Some portals that contain crowd sourced or collated information from unreliable references often hits the top results pages of Google. Even if there are new rules and laws now being crafted by institutions to serve as guidelines for the use of the web, there is still no certainty in knowing if a published article is authentic and credible if you don’t check on it.

Despite all this digital disruptions occurring, REX Book Store, stayed true to its mission, and  has continued to contribute in fostering sustainable and collaborative partnerships among concerned stakeholders: taking lead in the effort to create holistic learning experiences that would enable learners to be future leaders and professionals who carry fundamental principles of human dignity and a keen sense of social justice, while also keeping ahead of the curve in leveraging the resources which the 4th industrial revolution brings.

Through its deep understanding of how digital disruption can be leveraged for education, REX Book Store paves the way and lays the groundwork for the next generation of practitioners who are not just tech-savvy, but also consciously committed to providing responses to relevant issues that affect the way we live our everyday lives. This is the kind of engagement and social responsibility that proceeds with critical thinking and is firmly rooted on human values of respect, dignity, and harmonious understanding, producing whole and joyful young persons with an immense desire to contribute to the betterment of society.

We must remember that it is not about the hardware or software or how we experience tech through well-designed interface, it is how we make use of them, especially to improve ourselves and learn, that matters.

Join and help Rex Bookstore make the Whole Child, Visit www.wholechild.rexbookstore.ph.
          SmartMetric, Inc. (SMME: OTCQB) | SmartMetric The Creator Of The Biometric Credit Card Says Over 7 Billion Chip Cards Have Now Been Issued Globally      Cache   Translate Page   Web Page Cache   
none
          Comment on A Guide to a South African Passport Renewal by Louis      Cache   Translate Page   Web Page Cache   
Does Home Affairs keep previously scanned biometric info? For example if you have done your smart ID before? Do I still need to do the biometrics part for passport renewal?
          New Canting Cases Provide an Inclination of 12 Degrees      Cache   Translate Page   Web Page Cache   
The Canting Cases are available in 7.95, 9.52 and 11.10 in. lengths with 6.69 in. width and 1.96 in. height. The units come with flat anodized end panels or molded covers in UV stable lava grey ASA+PC-FR. The cases feature four non-slip rubber feet and inclines the SMART-TERMINAL enclosure by 12° operating angle. The covers are placed inside soft-touch TPV gray or green seals and are suitable for interface equipment, communications, safety engineering, biometrics, medical and laboratory...

This story is related to the following:
Electronic Components & Devices
Material Handling & Storage

Search for suppliers of: Cases | Aluminum Electronic Enclosures

          Sensori biometrici sotto il display, nel 2019 dilagheranno      Cache   Translate Page   Web Page Cache   
La produzione di scanner biometrici posizionati sotto il display degli smartphone potrebbe toccare quota 100 milioni di unità entro il 2019.
          Congress delays rule that would require biometric security readers for truckers at high-risk ports      Cache   Translate Page   Web Page Cache   
The deadline for high-risk maritime facilities to implement biometric card readers for truck drivers and other transportation personnel has been postponed until the Department of Homeland Security (DHS) reports to Congress on its Transportation Worker Identification Credential program.
          Cyber Security Manager - Leidos - Fairmont, WV      Cache   Translate Page   Web Page Cache   
The capability can receive multi-modal biometrics submissions to include iris, face, palm and finger prints from biometrics collection devices, which will...
From Leidos - Mon, 11 Jun 2018 16:15:00 GMT - View all Fairmont, WV jobs
          Cyber Security Engineer - Leidos - Fairmont, WV      Cache   Translate Page   Web Page Cache   
The capability can receive multi-modal biometrics submissions to include iris, face, palm and finger prints from biometrics collection devices, which will...
From Leidos - Fri, 25 May 2018 10:26:53 GMT - View all Fairmont, WV jobs
          Biometric (Tenprint) Examiner - IDEAL INNOVATIONS INC - Clarksburg, WV      Cache   Translate Page   Web Page Cache   
Comparison of known palm prints to eliminate individuals or effect positive identifications; Preparation of fingerprints, palm prints, face images, and/or iris...
From Indeed - Wed, 08 Aug 2018 19:37:39 GMT - View all Clarksburg, WV jobs
          Senior SAS Application Development Programmer      Cache   Translate Page   Web Page Cache   
CA-Pleasanton, Our client, a world leader in Pharmaceuticals and In-Vitro Diagnostics (IVD) tools, is seeking a “Senior SAS Application Development Programmer". Job Summary: Senior SAS Application Development Programmer is responsible for supporting statistical programming function in the development and maintenance of SAS macro library for one or more Biometrics sites. Acts as the first line of technical suppor
          Mid-range smartphones with in-display fingerprint sensors could become standard soon      Cache   Translate Page   Web Page Cache   
Despite being largely unknown in the Western Hemisphere, China-based smartphone vendor Vivo made quite a splash at the 2018 Consumer Electronics Show in Las Vegas back in January by unveiling the world’s first handset with in-display fingerprint recognition technology.

The “invisible” biometric sensor gradually started to show up on more and more Vivo models, as well as devices from Huawei, Xiaomi, and most recently Meizu, but this is obviously still not what we’d call a mainstream smartphone feature.

According to a research and consulting firm, the technology that continues ...
          San Jose to become first all-biometric airport on U.S. West Coast for international travel      Cache   Translate Page   Web Page Cache   
Mineta San Jose International Airport will become the first airport on the West Coast of the U.S. to identify every...
          ImageWare reports 31 percent 1H revenue increase      Cache   Translate Page   Web Page Cache   
ImageWare Systems reported second quarter revenue for 2018 of $1.9 million, 78 percent higher than the same quarter in 2017,...
          Test Engineer      Cache   Translate Page   Web Page Cache   
MD-Joppa, Future Skies is a dynamic, woman-owned small business that is co-headquartered in Wall, NJ and Joppa, MD. Founded in 2001, Future Skies develops and provides innovative technology and advanced engineering solutions to challenges in interoperability, robotics, embedded programming, cloud and mobile computing and biometrics. Furthermore, Future Skies specializes in professional custom software devel
          System Engineer      Cache   Translate Page   Web Page Cache   
MD-Joppa, Future Skies is a dynamic, woman-owned small business that is co-headquartered in Wall, NJ and Joppa, MD. Founded in 2001, Future Skies develops and provides innovative technology and advanced engineering solutions to challenges in interoperability, robotics, embedded programming, cloud and mobile computing and biometrics. Furthermore, Future Skies specializes in professional custom software devel
          Software Developer      Cache   Translate Page   Web Page Cache   
MD-Joppa, Future Skies is a dynamic, woman-owned small business that is co-headquartered in Wall, NJ and Joppa, MD. Founded in 2001, Future Skies develops and provides innovative technology and advanced engineering solutions to challenges in interoperability, robotics, embedded programming, cloud and mobile computing and biometrics. Furthermore, Future Skies specializes in professional custom software devel
          Negocios con los datos biométricos      Cache   Translate Page   Web Page Cache   

No son pocos los que consideran los datos biométricos –el iris o las huellas digitales– como un arma maravillosa en la lucha contra la delincuencia y el terrorismo. Un pasaporte hurtado basta para saquear las cuentas bancarias de la víctima y cometer otros delitos. Una y otra vez, empresas globales como Google o Facebook notifican […]

The post Negocios con los datos biométricos appeared first on Revista Gente Quintana Roo.




Next Page: 10000

Site Map 2018_01_14
Site Map 2018_01_15
Site Map 2018_01_16
Site Map 2018_01_17
Site Map 2018_01_18
Site Map 2018_01_19
Site Map 2018_01_20
Site Map 2018_01_21
Site Map 2018_01_22
Site Map 2018_01_23
Site Map 2018_01_24
Site Map 2018_01_25
Site Map 2018_01_26
Site Map 2018_01_27
Site Map 2018_01_28
Site Map 2018_01_29
Site Map 2018_01_30
Site Map 2018_01_31
Site Map 2018_02_01
Site Map 2018_02_02
Site Map 2018_02_03
Site Map 2018_02_04
Site Map 2018_02_05
Site Map 2018_02_06
Site Map 2018_02_07
Site Map 2018_02_08
Site Map 2018_02_09
Site Map 2018_02_10
Site Map 2018_02_11
Site Map 2018_02_12
Site Map 2018_02_13
Site Map 2018_02_14
Site Map 2018_02_15
Site Map 2018_02_15
Site Map 2018_02_16
Site Map 2018_02_17
Site Map 2018_02_18
Site Map 2018_02_19
Site Map 2018_02_20
Site Map 2018_02_21
Site Map 2018_02_22
Site Map 2018_02_23
Site Map 2018_02_24
Site Map 2018_02_25
Site Map 2018_02_26
Site Map 2018_02_27
Site Map 2018_02_28
Site Map 2018_03_01
Site Map 2018_03_02
Site Map 2018_03_03
Site Map 2018_03_04
Site Map 2018_03_05
Site Map 2018_03_06
Site Map 2018_03_07
Site Map 2018_03_08
Site Map 2018_03_09
Site Map 2018_03_10
Site Map 2018_03_11
Site Map 2018_03_12
Site Map 2018_03_13
Site Map 2018_03_14
Site Map 2018_03_15
Site Map 2018_03_16
Site Map 2018_03_17
Site Map 2018_03_18
Site Map 2018_03_19
Site Map 2018_03_20
Site Map 2018_03_21
Site Map 2018_03_22
Site Map 2018_03_23
Site Map 2018_03_24
Site Map 2018_03_25
Site Map 2018_03_26
Site Map 2018_03_27
Site Map 2018_03_28
Site Map 2018_03_29
Site Map 2018_03_30
Site Map 2018_03_31
Site Map 2018_04_01
Site Map 2018_04_02
Site Map 2018_04_03
Site Map 2018_04_04
Site Map 2018_04_05
Site Map 2018_04_06
Site Map 2018_04_07
Site Map 2018_04_08
Site Map 2018_04_09
Site Map 2018_04_10
Site Map 2018_04_11
Site Map 2018_04_12
Site Map 2018_04_13
Site Map 2018_04_14
Site Map 2018_04_15
Site Map 2018_04_16
Site Map 2018_04_17
Site Map 2018_04_18
Site Map 2018_04_19
Site Map 2018_04_20
Site Map 2018_04_21
Site Map 2018_04_22
Site Map 2018_04_23
Site Map 2018_04_24
Site Map 2018_04_25
Site Map 2018_04_26
Site Map 2018_04_27
Site Map 2018_04_28
Site Map 2018_04_29
Site Map 2018_04_30
Site Map 2018_05_01
Site Map 2018_05_02
Site Map 2018_05_03
Site Map 2018_05_04
Site Map 2018_05_05
Site Map 2018_05_06
Site Map 2018_05_07
Site Map 2018_05_08
Site Map 2018_05_09
Site Map 2018_05_15
Site Map 2018_05_16
Site Map 2018_05_17
Site Map 2018_05_18
Site Map 2018_05_19
Site Map 2018_05_20
Site Map 2018_05_21
Site Map 2018_05_22
Site Map 2018_05_23
Site Map 2018_05_24
Site Map 2018_05_25
Site Map 2018_05_26
Site Map 2018_05_27
Site Map 2018_05_28
Site Map 2018_05_29
Site Map 2018_05_30
Site Map 2018_05_31
Site Map 2018_06_01
Site Map 2018_06_02
Site Map 2018_06_03
Site Map 2018_06_04
Site Map 2018_06_05
Site Map 2018_06_06
Site Map 2018_06_07
Site Map 2018_06_08
Site Map 2018_06_09
Site Map 2018_06_10
Site Map 2018_06_11
Site Map 2018_06_12
Site Map 2018_06_13
Site Map 2018_06_14
Site Map 2018_06_15
Site Map 2018_06_16
Site Map 2018_06_17
Site Map 2018_06_18
Site Map 2018_06_19
Site Map 2018_06_20
Site Map 2018_06_21
Site Map 2018_06_22
Site Map 2018_06_23
Site Map 2018_06_24
Site Map 2018_06_25
Site Map 2018_06_26
Site Map 2018_06_27
Site Map 2018_06_28
Site Map 2018_06_29
Site Map 2018_06_30
Site Map 2018_07_01
Site Map 2018_07_02
Site Map 2018_07_03
Site Map 2018_07_04
Site Map 2018_07_05
Site Map 2018_07_06
Site Map 2018_07_07
Site Map 2018_07_08
Site Map 2018_07_09
Site Map 2018_07_10
Site Map 2018_07_11
Site Map 2018_07_12
Site Map 2018_07_13
Site Map 2018_07_14
Site Map 2018_07_15
Site Map 2018_07_16
Site Map 2018_07_17
Site Map 2018_07_18
Site Map 2018_07_19
Site Map 2018_07_20
Site Map 2018_07_21
Site Map 2018_07_22
Site Map 2018_07_23
Site Map 2018_07_24
Site Map 2018_07_25
Site Map 2018_07_26
Site Map 2018_07_27
Site Map 2018_07_28
Site Map 2018_07_29
Site Map 2018_07_30
Site Map 2018_07_31
Site Map 2018_08_01
Site Map 2018_08_02
Site Map 2018_08_03
Site Map 2018_08_04
Site Map 2018_08_05
Site Map 2018_08_06
Site Map 2018_08_07
Site Map 2018_08_08
Site Map 2018_08_09
Site Map 2018_08_10