Showing posts with label Futurists. Show all posts
Showing posts with label Futurists. Show all posts

Futurist's Cheat Sheet: Internet of Things

Through the Internet, humans have connected the world. People are closer to each other than ever while still remaining apart. The next phase of the the Internet will be about connecting things. The Internet of Things will be central to the infrastructure that we build. (The "Futurist's Cheatsheet" series surveys technologies on the horizon: their promise, how likely they are, and when they might become part of our daily lives. This article is Part 5.)

Think of a thing. Really, it could be anything. A chair, a toaster, parts of a car, the lights in your house, the electricity meter, the security cameras in your offices, a fire hydrant, traffic lights … really, anything or everything that can exist could be connected to the Internet. Another name for the Internet of Things is a network of things. The network can monitor your home, your car, infrastructure (utilities such as electricity or water), traffic patterns and a variety of other possibilities to create a more informed and responsive system through data analysis. 

Do you really need an Internet-connected toaster? Probably not. But, the toaster is a good place to start when discussing the Internet of Things. 

What would you expect from a smart toaster? Perhaps a touch screen on which to schedule cooking. It could be connected to the coffee pot, enabling the perfect breakfast for you as soon as you wake. Your toaster could be programmed from your computer or a mobile app. Say you are laying in bed and know you are going to sleep in the next day, pull out your smartphone and reprogram the toaster to start an hour later.

A toaster could have its own IP address on the Internet. In theory, you could visit your toaster’s site. Giving things a full IP address is one way to tie a thing to the Internet. Another way, and the way in which many things will be tied to the Internet, is for a thing to just have the ability to connect to the Internet, without and IP address.

Now, imagine that there is no digital interface on your toaster. In this case it is just a toaster that happens to have cellular or Wi-Fi capabilities and sensors to monitor how well it performs. It sends sensor data back to the manufacturer through Internet nodes and portals without an individual IP address. The manufacturer uses this data to know how its product is working in the wild, how often it is used, and use this data to make a better toaster. 

Go back and replace the word toaster with anything, say, a power meter. The same concepts apply. An Internet of Things can use the Web as an interface, or just use the Internet to move data. That data can be used to interact with the network of things or just as a pipeline where data moves two ways, analyzed and used to make objects smarter and more responsive to people’s needs. 

There are so many ways that an Internet of Things could impact people’s lives that it is hard to describe everything. Distilling it to a few key areas helps define what the scope of an Internet of Things could be: infrastructure (buildings and utilities), consumer (cars and homes), health care and businesses (consumer products and retail locations). 

Weather-related sensors could help agriculture by monitoring the moisture in the air or ground and give farmer’s warning about droughts. Smart buildings can provide enhanced security for the people that enter them or warning on disasters such as earthquakes. Connected cars can improve traffic flows or allow functions to be controlled remotely. Items within the home (such as the toaster) can be controlled and monitored and even connected to each other. 

Health care is an interesting avenue for the Internet of Things. Certain aspects of the body could be connected to the Internet. Heart sensors could give patients and doctors data to prevent disease. Sensors that monitor white blood cells could give cancer or AIDS patients warning of a relapse. 

The scope and impact of the Internet of Things is almost limitless. It is just up to the innovators of the world to be creative and find ways to make it work.

Much of the base technology that will enable and Internet of Things is available. The challenge now is to refine that technology and make it ubiquitous. 

A truly connected society involves a concerted effort from many different industry sectors such as telecommunications (the lines that would do the actual connecting), to device and appliance makers that would implant sensors and connectivity into things. Software developers would then have to create the interfaces. There are also security and privacy issues, such as keeping this mountain of data safe and away from prying eyes. Wireless standards and infrastructure also need to improve to handle all of the data that would be generated. 

Many of the innovations we have written about in The Futurist’s Cheat Sheet have seeds in today’s technology. That is the same for the Internet of Things. The technology is present, but the infrastructure and stability behind it needs to be improved.

Companies specializing in machine-to-machine functions such as Numerex and KORETelematics are already in the process of designing the connected world and building business models that will help define the Internet of Things. 

The progression will be slow. There is no event horizon where suddenly the technology that is only a theory becomes a reality.

The Internet of Things is something that must be built and refined, not something like quantum computing that is waiting for a significant technological breakthrough. In five years we will start seeing more connected cars and homes.

Infrastructure like smart grids and utilities will take longer to build and we will see it evolve over the next 10 years and more. The Internet of Things will become embedded in our lives and the growth will not stop during out lifetimes. 

European Commission: Cluster of European Research Projects: Vision and Challenges for Realising the Internet of Things (March 2010)

IEEE: Architecture and Protocols for the Internet of Things: A Case Study (2010)

GigaOm: United States of Connectedness: What works for Internet of Things

ReadWriteWeb: Top 5 Web Trends of 2009: Internet of Things

ReadWriteWeb: Top 10 Internet of Things Developments of 2010

ReadWriteWeb: Internet of Things Explained (Video)


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Futurist's Cheat Sheet: Human Augmentation

As long as there have been humans, there have been dreams of super humans. Eyeglasses started sharpening vision in the 1200s, pacemakers have been implanted to extend lifespans since the late 1950s, and the first strength-amplifying robotic exoskeletons shipped earlier this year. But those innovations are only the beginning. With advances in technology, the ability to vastly enhance human capabilities is right around the corner. Here is an overview of current efforts and their potential. (The "Futurist's Cheatsheet" series surveys technologies on the horizon: their promise, how likely they are, and when they might become part of our daily lives. This article is Part 1.)

Human augmentation is the ability to supplement human brains and bodies with technological improvements. The notion has been part of science fiction lore for decades. Ever hear a sports announcer say, “that guy has a cannon for an arm!” Well, what if he had an actual cannon for an arm? RoboCop, Mr. Gadget, Star Wars (what is Darth Vader but an augmented human?), and the Bourne Identity all offer visions of how human augmentation could one day be achieved. 

But it's already well underway. With the buzz around Google Glasses and Oscar “Blade Runner” Pistorius' speedy artificial legs, the notion of creating a better human body through machinery and computers is the subject of much theory and research these days. 

There are many paths to human-machine augmentation: wearable technology such as Google Glasses, sensor implants, using DNA and chemical processes to enhance brain function and muscle functions, nanorobotics, performance enhancing surgery. Some theorists, notably Ray Kurzweil, believe the brain will be encoded as software someday, allowing it to be reprogrammed, enhanced by peripheral technology, tethered to a robotic body, and immortal. (Until the next backward-incompatible system update.)

The idea is to enhance the human notion of “normal.” At the same time, human augmentation can be used to repair parts of the body, such as cochlear implants for the hard of hearing. Laser eye surgery is a good example of both reparative and enhancive human augmentation, as it could be used to help the sight of the visually impaired or enhance the vision of people with normal eyesight. Many professional athletes, such as baseball players, get laser surgery. 

Research firm Gartner notes that there will soon be a market for human augmentation to create “superhuman” characteristics, such as a suit that improves endurance or adds extra senses to the body. There have also been recent advances in implantable technology that can monitor health-related data, such as heart rate or insulin level. 

Miniaturization and advances in wireless technology enable many sensor-based technologies to be implanted into human bodies now. Moreover, the combination of computer and genetic technology could enable people to retrofit themselves with superhuman characteristics going forward. 

In the short term, researchers are working with the tools already available. Advances in mobile technology and wireless data transmission along with sensor enhancements are creating a new field in the biomedical industry. As scientists continue to crack the human genome, DNA augmentation will become increasingly powerful and controversial. One day, doctors may be able to completely rebuild body parts with computer and mechanical engineering and have them look and function just like normal flesh and bone.

In the long term, society will be challenged to cope with superior human beings. The notion of a mechanically-enhanced human has already entered the thoughts of lawmakers. Several U.S. states have passed laws banning employers requiring employees to implant computer chips in their bodies. As human enhancement becomes more common in the decades and centuries to come, there is a real danger of discrimination between the augmented versus the standard human.

Depends on the type of capability you are looking for. Strength-enhancing exoskeleton suits have been sold to the military and rehab hospitals. Google Glasses should be released as a consumer product in 2013 or so. Implantable, sensor-based technologies are just starting to hit the market. This is one field to keep an eye on as technology and biology merge to create the true ubermench that Nietzsche surely knew was coming.

Technology Review: In Pursuit of Human Augmentation

Wired: Be More Than You Can Be

Bloomberg: Advances in Human Augmentation: We Can Rebuild Him

Association for Computing Machinery's Augmented Human


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Futurist's Cheat Sheet: Biometric Authentication

The problem is not new. One way or another, people have to validate their identities. I am trying to enter a building or a Web service that only Joe Smith should have access to, I need to offer evidence that I am, indeed, Joe Smith. For decades, authentication has required cards and passwords. In the near future, you might just use a part of your body. (The "Futurist's Cheatsheet" series surveys technologies on the horizon: their promise, how likely they are, and when they might become part of our daily lives. This article is Part 2.)

Use a thumb-print to unlock a door, an iris scan to unlock a smartphone. Maybe use your voice to interact with your mobile device, PC or television. Biometric data can be used for verification (say, allowing access to a personal bank account) or identification (say, identifying you to law enforcement agencies). 

Pick a body part, any body part. There is a good chance that it has a unique identifier that can be used authenticate an individual human. Of course, not all body parts have practical applications in all situations. For instance, hormone analysis would be an awkward choice of authentication for entry to a building. 

Criminal forensics provided an early proving ground: Identification based on fingerprints became a viable form of authentication in the late 1800s. DNA performs much the same function today. 

Cloud technology is giving rise to new, ubiquitous forms of biometric authentication. Physical identifiers for large groups of people can be uploaded to a server and used for purposes such as accessing data on a company computer, gaining access to secure buildings or unlocking smartphones. Storing biometric keys in the cloud makes it much easier for devices to recognize and recover the data and for users to put it to work.

The rise of a digitally connected society has led technologists to propose the notion of “one true login.”  Today, you may have one password for Facebook, another for Gmail and so on. At the same time, you may have an ID card such as a driver’s license. Depending on where you work, you may have an ID badge that you have to scan to get into your office. What if all of these functions could be replaced with one biometric identifier unique to you? 

Such an innovation could improve personal and data security an dalso improve user experiences across a variety of devices. Much of modern computing has been built around the standard user interface: keyboard and screen. That is starting to change as computers, smartphones, tablets, and televisions incorporate cameras that recognize your face, touchscreens that know your fingerprint and microphones that recognize your voice. Quick, convenient biometric authentication would tie these devices more seamlessly into daily life.

The technology for biometric authentication is already widely available. The true challenge comes in building an acceptable infrastructure where the technologies can be easily implemented. Part of the challenge is cost in replacing or augmenting legacy authentication methods such as the magnetic keycard system in a hotel or an enterprise. Another challenge is legal. Many states and countries have privacy laws on how certain types of biometric identifiers can be used, inhibiting how enterprises and commercial ventures can deploy these authentication methods. These privacy laws are important as people are extremely sensitive in how their biomedical is stored and used. 

Research firm Gartner focuses on the future business aspects of biometric authentication in its most recent Hype Cycle report, but the consumer realm poised to see practical applications. Smartphones can be unlocked through a variety of biometric keys such as voice, facial recognition or a fingerprint. Apple, Samsung and Microsoft will likely lead the way. Companies like Nuance are tuning mobile devices to the user's voice. And enterprises won't be far behind. Before long, companies will implement biometric authentication for onsite building access and smartphone security.

Book -- Anil K. Jain et al. -- Introduction to Biometrics

Michigan State University -- Partial Face Recognition: Alignment-Free Approach

Microsoft Research --  Progressive Authentication: Deciding When to Authenticate on Mobile 


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Futurist's Cheat Sheet: Human Augmentation

As long as there have been humans, there have been dreams of super humans. Eyeglasses started sharpening vision in the 1200s, pacemakers have been implanted to extend lifespans since the late 1950s, and the first strength-amplifying robotic exoskeletons shipped earlier this year. But those innovations are only the beginning. With advances in technology, the ability to vastly enhance human capabilities is right around the corner. Here is an overview of current efforts and their potential. (The "Futurist's Cheatsheet" series surveys technologies on the horizon: their promise, how likely they are, and when they might become part of our daily lives. This article is Part 1.)

Human augmentation is the ability to supplement human brains and bodies with technological improvements. The notion has been part of science fiction lore for decades. Ever hear a sports announcer say, “that guy has a cannon for an arm!” Well, what if he had an actual cannon for an arm? RoboCop, Mr. Gadget, Star Wars (what is Darth Vader but an augmented human?), and the Bourne Identity all offer visions of how human augmentation could one day be achieved. 

But it's already well underway. With the buzz around Google Glasses and Oscar “Blade Runner” Pistorius' speedy artificial legs, the notion of creating a better human body through machinery and computers is the subject of much theory and research these days. 

There are many paths to human-machine augmentation: wearable technology such as Google Glasses, sensor implants, using DNA and chemical processes to enhance brain function and muscle functions, nanorobotics, performance enhancing surgery. Some theorists, notably Ray Kurzweil, believe the brain will be encoded as software someday, allowing it to be reprogrammed, enhanced by peripheral technology, tethered to a robotic body, and immortal. (Until the next backward-incompatible system update.)

The idea is to enhance the human notion of “normal.” At the same time, human augmentation can be used to repair parts of the body, such as cochlear implants for the hard of hearing. Laser eye surgery is a good example of both reparative and enhancive human augmentation, as it could be used to help the sight of the visually impaired or enhance the vision of people with normal eyesight. Many professional athletes, such as baseball players, get laser surgery. 

Research firm Gartner notes that there will soon be a market for human augmentation to create “superhuman” characteristics, such as a suit that improves endurance or adds extra senses to the body. There have also been recent advances in implantable technology that can monitor health-related data, such as heart rate or insulin level. 

Miniaturization and advances in wireless technology enable many sensor-based technologies to be implanted into human bodies now. Moreover, the combination of computer and genetic technology could enable people to retrofit themselves with superhuman characteristics going forward. 

In the short term, researchers are working with the tools already available. Advances in mobile technology and wireless data transmission along with sensor enhancements are creating a new field in the biomedical industry. As scientists continue to crack the human genome, DNA augmentation will become increasingly powerful and controversial. One day, doctors may be able to completely rebuild body parts with computer and mechanical engineering and have them look and function just like normal flesh and bone.

In the long term, society will be challenged to cope with superior human beings. The notion of a mechanically-enhanced human has already entered the thoughts of lawmakers. Several U.S. states have passed laws banning employers requiring employees to implant computer chips in their bodies. As human enhancement becomes more common in the decades and centuries to come, there is a real danger of discrimination between the augmented versus the standard human.

Depends on the type of capability you are looking for. Strength-enhancing exoskeleton suits have been sold to the military and rehab hospitals. Google Glasses should be released as a consumer product in 2013 or so. Implantable, sensor-based technologies are just starting to hit the market. This is one field to keep an eye on as technology and biology merge to create the true ubermench that Nietzsche surely knew was coming.

Technology Review: In Pursuit of Human Augmentation

Wired: Be More Than You Can Be

Bloomberg: Advances in Human Augmentation: We Can Rebuild Him

Association for Computing Machinery's Augmented Human


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Futurist's Cheat Sheet: Biometric Authentication

The problem is not new. One way or another, people have to validate their identities. I am trying to enter a building or a Web service that only Joe Smith should have access to, I need to offer evidence that I am, indeed, Joe Smith. For decades, authentication has required cards and passwords. In the near future, you might just use a part of your body. (The "Futurist's Cheatsheet" series surveys technologies on the horizon: their promise, how likely they are, and when they might become part of our daily lives. This article is Part 2.)

Use a thumb-print to unlock a door, an iris scan to unlock a smartphone. Maybe use your voice to interact with your mobile device, PC or television. Biometric data can be used for verification (say, allowing access to a personal bank account) or identification (say, identifying you to law enforcement agencies). 

Pick a body part, any body part. There is a good chance that it has a unique identifier that can be used authenticate an individual human. Of course, not all body parts have practical applications in all situations. For instance, hormone analysis would be an awkward choice of authentication for entry to a building. 

Criminal forensics provided an early proving ground: Identification based on fingerprints became a viable form of authentication in the late 1800s. DNA performs much the same function today. 

Cloud technology is giving rise to new, ubiquitous forms of biometric authentication. Physical identifiers for large groups of people can be uploaded to a server and used for purposes such as accessing data on a company computer, gaining access to secure buildings or unlocking smartphones. Storing biometric keys in the cloud makes it much easier for devices to recognize and recover the data and for users to put it to work.

The rise of a digitally connected society has led technologists to propose the notion of “one true login.”  Today, you may have one password for Facebook, another for Gmail and so on. At the same time, you may have an ID card such as a driver’s license. Depending on where you work, you may have an ID badge that you have to scan to get into your office. What if all of these functions could be replaced with one biometric identifier unique to you? 

Such an innovation could improve personal and data security an dalso improve user experiences across a variety of devices. Much of modern computing has been built around the standard user interface: keyboard and screen. That is starting to change as computers, smartphones, tablets, and televisions incorporate cameras that recognize your face, touchscreens that know your fingerprint and microphones that recognize your voice. Quick, convenient biometric authentication would tie these devices more seamlessly into daily life.

The technology for biometric authentication is already widely available. The true challenge comes in building an acceptable infrastructure where the technologies can be easily implemented. Part of the challenge is cost in replacing or augmenting legacy authentication methods such as the magnetic keycard system in a hotel or an enterprise. Another challenge is legal. Many states and countries have privacy laws on how certain types of biometric identifiers can be used, inhibiting how enterprises and commercial ventures can deploy these authentication methods. These privacy laws are important as people are extremely sensitive in how their biomedical is stored and used. 

Research firm Gartner focuses on the future business aspects of biometric authentication in its most recent Hype Cycle report, but the consumer realm poised to see practical applications. Smartphones can be unlocked through a variety of biometric keys such as voice, facial recognition or a fingerprint. Apple, Samsung and Microsoft will likely lead the way. Companies like Nuance are tuning mobile devices to the user's voice. And enterprises won't be far behind. Before long, companies will implement biometric authentication for onsite building access and smartphone security.

Book -- Anil K. Jain et al. -- Introduction to Biometrics

Michigan State University -- Partial Face Recognition: Alignment-Free Approach

Microsoft Research --  Progressive Authentication: Deciding When to Authenticate on Mobile 


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Futurist's Cheat Sheet: Human Augmentation

As long as there have been humans, there have been dreams of super humans. Eyeglasses started sharpening vision in the 1200s, pacemakers have been implanted to extend lifespans since the late 1950s, and the first strength-amplifying robotic exoskeletons shipped earlier this year. But those innovations are only the beginning. With advances in technology, the ability to vastly enhance human capabilities is right around the corner. Here is an overview of current efforts and their potential. (The "Futurist's Cheatsheet" series surveys technologies on the horizon: their promise, how likely they are, and when they might become part of our daily lives. This article is Part 1.)

Human augmentation is the ability to supplement human brains and bodies with technological improvements. The notion has been part of science fiction lore for decades. Ever hear a sports announcer say, “that guy has a cannon for an arm!” Well, what if he had an actual cannon for an arm? RoboCop, Mr. Gadget, Star Wars (what is Darth Vader but an augmented human?), and the Bourne Identity all offer visions of how human augmentation could one day be achieved. 

But it's already well underway. With the buzz around Google Glasses and Oscar “Blade Runner” Pistorius' speedy artificial legs, the notion of creating a better human body through machinery and computers is the subject of much theory and research these days. 

There are many paths to human-machine augmentation: wearable technology such as Google Glasses, sensor implants, using DNA and chemical processes to enhance brain function and muscle functions, nanorobotics, performance enhancing surgery. Some theorists, notably Ray Kurzweil, believe the brain will be encoded as software someday, allowing it to be reprogrammed, enhanced by peripheral technology, tethered to a robotic body, and immortal. (Until the next backward-incompatible system update.)

The idea is to enhance the human notion of “normal.” At the same time, human augmentation can be used to repair parts of the body, such as cochlear implants for the hard of hearing. Laser eye surgery is a good example of both reparative and enhancive human augmentation, as it could be used to help the sight of the visually impaired or enhance the vision of people with normal eyesight. Many professional athletes, such as baseball players, get laser surgery. 

Research firm Gartner notes that there will soon be a market for human augmentation to create “superhuman” characteristics, such as a suit that improves endurance or adds extra senses to the body. There have also been recent advances in implantable technology that can monitor health-related data, such as heart rate or insulin level. 

Miniaturization and advances in wireless technology enable many sensor-based technologies to be implanted into human bodies now. Moreover, the combination of computer and genetic technology could enable people to retrofit themselves with superhuman characteristics going forward. 

In the short term, researchers are working with the tools already available. Advances in mobile technology and wireless data transmission along with sensor enhancements are creating a new field in the biomedical industry. As scientists continue to crack the human genome, DNA augmentation will become increasingly powerful and controversial. One day, doctors may be able to completely rebuild body parts with computer and mechanical engineering and have them look and function just like normal flesh and bone.

In the long term, society will be challenged to cope with superior human beings. The notion of a mechanically-enhanced human has already entered the thoughts of lawmakers. Several U.S. states have passed laws banning employers requiring employees to implant computer chips in their bodies. As human enhancement becomes more common in the decades and centuries to come, there is a real danger of discrimination between the augmented versus the standard human.

Depends on the type of capability you are looking for. Strength-enhancing exoskeleton suits have been sold to the military and rehab hospitals. Google Glasses should be released as a consumer product in 2013 or so. Implantable, sensor-based technologies are just starting to hit the market. This is one field to keep an eye on as technology and biology merge to create the true ubermench that Nietzsche surely knew was coming.

Technology Review: In Pursuit of Human Augmentation

Wired: Be More Than You Can Be

Bloomberg: Advances in Human Augmentation: We Can Rebuild Him

Association for Computing Machinery's Augmented Human


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Futurist's Cheat Sheet: Biometric Authentication

The problem is not new. One way or another, people have to validate their identities. I am trying to enter a building or a Web service that only Joe Smith should have access to, I need to offer evidence that I am, indeed, Joe Smith. For decades, authentication has required cards and passwords. In the near future, you might just use a part of your body. (The "Futurist's Cheatsheet" series surveys technologies on the horizon: their promise, how likely they are, and when they might become part of our daily lives. This article is Part 2.)

Use a thumb-print to unlock a door, an iris scan to unlock a smartphone. Maybe use your voice to interact with your mobile device, PC or television. Biometric data can be used for verification (say, allowing access to a personal bank account) or identification (say, identifying you to law enforcement agencies). 

Pick a body part, any body part. There is a good chance that it has a unique identifier that can be used authenticate an individual human. Of course, not all body parts have practical applications in all situations. For instance, hormone analysis would be an awkward choice of authentication for entry to a building. 

Criminal forensics provided an early proving ground: Identification based on fingerprints became a viable form of authentication in the late 1800s. DNA performs much the same function today. 

Cloud technology is giving rise to new, ubiquitous forms of biometric authentication. Physical identifiers for large groups of people can be uploaded to a server and used for purposes such as accessing data on a company computer, gaining access to secure buildings or unlocking smartphones. Storing biometric keys in the cloud makes it much easier for devices to recognize and recover the data and for users to put it to work.

The rise of a digitally connected society has led technologists to propose the notion of “one true login.”  Today, you may have one password for Facebook, another for Gmail and so on. At the same time, you may have an ID card such as a driver’s license. Depending on where you work, you may have an ID badge that you have to scan to get into your office. What if all of these functions could be replaced with one biometric identifier unique to you? 

Such an innovation could improve personal and data security an dalso improve user experiences across a variety of devices. Much of modern computing has been built around the standard user interface: keyboard and screen. That is starting to change as computers, smartphones, tablets, and televisions incorporate cameras that recognize your face, touchscreens that know your fingerprint and microphones that recognize your voice. Quick, convenient biometric authentication would tie these devices more seamlessly into daily life.

The technology for biometric authentication is already widely available. The true challenge comes in building an acceptable infrastructure where the technologies can be easily implemented. Part of the challenge is cost in replacing or augmenting legacy authentication methods such as the magnetic keycard system in a hotel or an enterprise. Another challenge is legal. Many states and countries have privacy laws on how certain types of biometric identifiers can be used, inhibiting how enterprises and commercial ventures can deploy these authentication methods. These privacy laws are important as people are extremely sensitive in how their biomedical is stored and used. 

Research firm Gartner focuses on the future business aspects of biometric authentication in its most recent Hype Cycle report, but the consumer realm poised to see practical applications. Smartphones can be unlocked through a variety of biometric keys such as voice, facial recognition or a fingerprint. Apple, Samsung and Microsoft will likely lead the way. Companies like Nuance are tuning mobile devices to the user's voice. And enterprises won't be far behind. Before long, companies will implement biometric authentication for onsite building access and smartphone security.

Book -- Anil K. Jain et al. -- Introduction to Biometrics

Michigan State University -- Partial Face Recognition: Alignment-Free Approach

Microsoft Research --  Progressive Authentication: Deciding When to Authenticate on Mobile 


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

 
I Phone © 2012 | Designed by LogosDatabase.com, in collaboration with Credit Card Machines, Corporate Headquarters and Motivational Quotes