In the 1990’s, who would have thought that by 2015 most of your sensitive health records might be stored on the mobile phone in your pocket.  If you thought you were afraid of leaving your smartphone ...
By Jeff Harris, 12/16/2014
NFC and Biometrics: Managing Mobile Payments with Multi-Modal Biometric Security With the recent advent of Apple Pay system and other mobile payment systems like ISIS/Softcard (might want to think ...
U.S. organized crime and Trans-continental criminal organizations have been engaged in a comparatively new line of business, outside of the standard operations of extortion, gambling, and the ...
One of the great things about living in Portland, Oregon—other than being a member of ImageWare’s software development team of course—is the ubiquitous Portland summer barbecue. Since we spend most ...
What do Ötzi the Iceman, Barbie, and pathologists across the world have in common? Tattoos! Since the 4th millennium, tattoos have been used for multiple purposes; from medicinal uses and personal ...
Few question the necessity of utilizing biometric authentication for security, but the battle still rages over the role of the cloud  It is obvious that the current methods of securing our devices ...
BIO-IDaaS – Biometric – Identity as a Service “Who are you?” This question is asked directly or indirectly every day.
Daily, we see police dramas supply television viewers with a so-called “inside” look at the various procedures required for solving crimes.  A detective pulls out a single image from his inside ...
I just came back from the 2014 Drug Information Association’s (DIA) Annual Meeting in downtown San Diego, the industry’s largest multi-disciplinary event.  This event brings together a community of ...
1 2 3 4