Convenient navigation aids are as follows: Left clicking on:
A Table of Contents entry will
bring you to the related article. .
"Source" will bring you to the original article at the
website of its initial posting - if it is still there;
"Next" - Will bring you to the next article in sequence.
Contents - Will bring you back to the table of
contents.
01. Personal data
security law takes effect - By Becky Yerak -
Chicago Tribune - December 31, 2005
02. Program to
track foreign visitors gets mixed reviews - Border
loopholes: Critics say too many people arriving in the United States
are exempt from the regulations - By Nicole Gaouette - Los
Angeles
Times - Salt Lake Tribune - Dec 31, 2005
03. Homeland Security
still lacks cohesion and efficiency, report
says - BY JAMES GORDON MEEK - New York Daily News - The Mercury
News - Dec 29, 2005
04. Research Abstract -
Upgrading NetWare NDS Environments: Options
and Business Value by Quest Software - June 2005
- VENDOR WHITE PAPER - (.pdf) (266 kb) - 20 pages
05. U.S. Installs
Visitor Tracking Stations - The US-VISIT program
to collect information on incoming foreigners and screen them steps
toward full operation. - By Nicole Gaouette - Los Angeles
Times -
Dec 31, 2005
06. Security becomes a
touchy proposition - By Mike Berman -
Scripps Howard News Service - December 31, 2005
07. Press Release (US
Department of Homeland Security) - DHS
Completes Foundation Of Biometric Entry System - Represents Major
Advance to Immigration and Border Management - Dec 30,
2005
08. Speedier
airport access in works - Convenience programs allow
travelers to bypass long security lines by offering pre-screening
services for a fee. - By CANDI CALKINS - Palm Beach Daily News
(Florida) - Dec 31, 2005
09. Scrapping of
elections imminent, Haiti on the verge of another
crisis - Dominican Today - Dec 30, 2005
10. Today's Budget
Tomorrow's Plan - By Doug Henschen -
Intelligent Enterprise - January, 2006
11. Focus on Signals, Not the Noise - Focus on finding data signals
amid the noise
. - By David Stodder - Intelligent Enterprise -
January, 2006
12. Airport
Security Mkt. is About to Get More Bullish - Airport
Business - Airport Security Report via NewsEdge Corporation - Dec
30,
2005
13. Mexican thumbs-up for Aussie fingerprint deal
- The
Australian - Dec 31, 2005
14. Review of 2005's
most important immigration news stories -
WorkPermit.com - Dec 30, 2005
15. Middle East's
Security and Safety trade fair set for end January
- Khaleej Times - Dec 30, /2005
16. Today's America a
burden on the future - ICH - By Manuel
Valenzuela - Mathaba.net [UK] - December 30, 2005
17. The Story of
Maher Arar: Unfolding US-Canada Police State -
December 29, 2005
18. APC Biometric Mouse Password Manager Review
by André
Gordirro - HardwareSecrets.com - Dec 29, 2005
19. Press
Release - Identix experiencing growing demand for
biometric authentication systems with Fiscal 2006 orders exceeding $2.2
million - SecureID News - December 29 2005
20. Press Release -
Bioscrypt, HID and OMNIKEY team to develop a
door-to-desktop card solution - December 29 2005
21. Press Release -
What big eyes you have...the better to hear you
with - Infrared communications system lets binoculars transmit sound.
- Eurekalert.org - Dec 29, 2005
22. Immigration czar faces court backlog order
- By Shaun
Waterman - Monsters and Critics.com - Dec 29, 2005
23. Casinos
leery of biometrics, new pay systems - BY VALERIE
MILLER - Las Vegas Business Review Press - Dec 27, 2005
24. Blown away by new
technology - By Selma Milovanovic - The
Age [Australia] - December 30, 2005
25. 2006 i-Technology Predictions: SYS-CON's Annual Round-Up of
Techno-Prognostications - Software Development Activists, Evangelists,
Gurus, and Executives Speak Out - By Jeremy Geelan - SysCon
Technology - Dec 31, 2005
26. Scanners
latest tool in contraband fight - NewsNine
[Australia] Dec 29, 2005
27. One Million Biometric PCs To Be Sold: Lenevo
- EFY News
Network - Dec 29, 2005
28. Press
Release - Federal Court Orders Department of Homeland
Security to Issue Proof of Lawful Status to Permanent Residents -
Unfounded Security Concerns Do Not Justify Withholding Documentation
Beyond a Reasonable Time - Dec 28, 2005
29. Blair’s 12-point plan to tackle terror fails to get full marks
- The Peninsula [Quatar] - [From the Times] Dec 29, 2005
30. Watchdog
report:
Delay in sitters' crime checks - State
has OK'd some with serious criminal pasts to baby-sit for welfare
program. - By Clea Benson -The Sacramento Bee [California] -
December 31, 2005
31. State's
missing persons staff stays busy - By BEN TINSLEY -
Forth Worth Texas STAR-TELEGRAM - Dec 29,2005
32. House Hears From
Grassroots; Is Senate Listening? by Phyllis
Schlafly - The Conservative Voice - Dec 28, 2005
33. DHS
shoves fingerprint tech forward - By Wilson P. Dizard III
- Government Computer News - Dec 28, 2005
34. U.S. Visit: New Level Of Airport Security At JFK - Security
Measure Founded After '93 WTC Bombing Implemented
- WCBS TV (NY) -
Dec 27, 2005
35. Pragmatics to
support Justice automated booking system - By
Roseanne Gerin - WashingtonTechnolgy.com - Dec 27, 2005
36. Adoption of
infotronics stressed - Chennai On Line [India]
- Dec 31, 2005
37. Wear do we go? - by CROY,
NANDINI RAGHAVENDRA & SANJEEV
SINHA TIMES NEWS NETWORK - The Economic Times (India) - Jan 1, 2005
38. 2005 offbeat
escapades: science, records and strange stories
[The following are extracts from a longer list] - The Daily Times
[Pakistan] - Jan 1, 2006
39. At the scene
in
Atlanta - WVU forensics program sets up learning
lab for bowl game By Carl “Butch”
Antolini -
The Register Herald [West Virginia] - JNan 1, 2006
40. Match points - By Dorothy
Yagodich - THE TRIBUNE-REVIEW
[Pittsburgh, Pennsylvania] - Jan 1, 2006
41. CM inaugurates
computerised attendance recording system - Web India 123 -
Guwahati
- Jan 1, 2006
42. Doña Ana suspect turns out not to
be
suspect
- The U.S. Border Patrol thought they had their man. -
Alamogordo News (New Mexico)
- January 1, 2006
43. A year
later, RCMP helping Thais identify victims of tsunami - Brandon
Sun [Canada} - Jan 1, 2006
44. Alleged
al-Qaida aide said to fake death by SELCAN HACAOGLU -
Associated Press - Houston Chronicle - Jan 1, 2006
45, Tech lab arms cops
with new sidekicks - Cyber files decoding
evidence of new era - BY KATIE WANG - The Star-Ledger
(New
Jersey)
- Jan 1, 2005
46.
Israeli consortium lays the groundwork for genetic 'credit card' - By David Brinn - Israel21c.org -
January 01, 2006
47. Zero tolerance urged on foreign criminals - By Philip Johnston - The Telegraph (UK) - Jan 2,
2006
48. Wanted:
Up-Front Security - Security built into software and systems will be a
high priority for businesses in 2006. - By
Larry Greenemeier, InformationWeek - Jan. 2, 2006
49. Editorial: VIP
screening a better way to fly? - TCPalm.com [Florida] - January 2, 2006
50. Crystal
ball displaying technical advances by Gerard
Voland - Fort Waytne [Indiana] Journal Gazette - Jan 2, 2005
51.
Press Release - Identity Management Solution promotes enterprise
security. - ThomasNet.com [Date of Original Release - Dec 5,
2005]
52. University's
thumb rule malfunctions - By: Kiran Tare - MidDay [India]
December 30, 2005
53. Press Release
- Remarks by Homeland Security Secretary Michael
Chertoff on Homeland Security Accomplishments and Priorities -
December
20, 2005
54. Identity Federation - By Tim Pickard, RSA Security - IT Observer.com -
Jan
2, 2006
55.
FINDINGS;
Is That a Finger or a Jell-O Mold? The Scanner, It Turns Out, Has No
Way of Knowing
56. Press Rlease
- HID Announces Availability of iClass OEM 13.56 MHz contactless smarct
card read / write module - Security Park.net - Jan 2, 2006
57. Press Release - Axis unveils
biometric ATM - Plans IPO, acquisitions in India, US - Sameer
Godse / Pune January 03, 2006
58. Is That a Bull's-Eye On Your Wallet? - By John Sparks -
Newsweek International - Jan 8, 2006
59. Two Cents:
Lenovo
ThinkCentre M51 -
- Government Technology - Jan 2, 2006
60.
Five things to expect in 2006 - By Thomas Frank -
USA Today - January 3, 2006
61. 100-year-old
firm has lock on growth - Rolland Safe &
Lock is evolving along with its tech-heavy industry - By VICTOR GODINEZ
/ The Dallas Morning News - Jan 3, 2006
62. Oracle unveils
comprehensive identity management suite - Strategy.com - Jan 3,
2006
63. Simple Sign-On - Sarbanes Oxley
Compliance Journal - Jan 3, 3006
64. Press Release -
WinMagic Disk Encryption Technology Now Included with New Toshiba
Dynabook Notebooks in Japan - Military Imbedded Systems - Jan
3, 2006
65. Press Release - Experts unite on biometrics -
Research
and Development Via Thomson Dialog NewsEdge - Jan 3, 2006
=======================================
01. Personal data
security law takes effect - By Becky Yerak - Chicago Tribune -
December 31, 2005
Source
Next Contents
A law requiring businesses to promptly notify customers of security
breaches involving their personal information takes effect Sunday in
Illinois, one of a growing number of states trying to curb identity
theft.
But data security observers see several shortcomings in such laws,
including that they could be difficult to enforce or could backfire for
some consumers.
The Illinois legislature passed the Personal Information Protection Act
last May, making it the second state, after California, to require
companies to promptly alert consumers of security breaches involving
their personal information, Susan Hofer, spokeswoman for the Illinois
Department of Financial and Professional Regulation, said Friday.
Gov. Rod Blagojevich signed the legislation in June, and the law takes
effect Sunday.
Nearly 20 other states have passed so-called "breach notification"
laws, according to the Public Interest Research Group.
Illinois' measure was inspired by a 2004 incident in which
Georgia-based ChoicePoint sold the personal information of more than
145,000 people, including 5,000 Illinois residents, to identity thieves
posing as legitimate businesses. Even after ChoicePoint caught on to
the breach, consumers were not notified until months later, in response
to a California law requiring the disclosure of security breaches of
personal information, according to Blagojevich's office.
The Illinois law "can help individuals take steps to protect their
assets and identities before thieves wreak havoc on their credit,"
Blagojevich said in a statement after signing the bill.
The law does not specify exactly how quickly consumers must be notified
if data is lost or stolen, but generally says data collectors must
notify consumers "without unreasonable delay" after learning of a
security breach.
"Prior to this law, there were no requirements for companies to notify
individuals about possible security issues," Hofer said.
But one privacy and data protection lawyer said a federal law also is
needed because state laws vary so widely.
"A company that does business in a lot of states may have problems,"
said Chris Wolf, chairman of the privacy and data security group of law
firm Proskauer Rose. "It's like trying to play a game of Whack-a-Mole
to try to comply with different laws" absent federal legislation.
The Illinois Bankers Association, however, doesn't seem to think the
new notification law will be onerous.
"In the case of banks, they have pretty much followed that anyway,"
said association spokeswoman Debbie Jemison. "It's not going to be a
huge difference."
Also taking effect in Illinois Sunday is a law allowing victims of
identity theft to place a freeze on their credit report, preventing its
release to any party without their consent.
That law "looks decent--no fee for placing the freeze or lifting it,
reasonable time limits on when the credit bureau has to respond," said
Beth McConnell, director of the public interest group in Pennsylvania.
However, "it could have been stronger by allowing any consumer to
freeze their report as a preventive measure, not just ID theft victims."
But Proskauer's Wolf said the notification law will likely lead to
companies ringing alarm bells when consumers needn't be worried. In
response, consumers might put a security freeze on their credit
accounts, protecting them from misuse but also making it tougher to
legitimately use credit and open new accounts, he said.
One identity fraud detection service said such laws do little to
prevent the growth in identity theft.
"There are so many ways of using identity information," said Terrence
DeFranco, chief executive officer of Edentify Inc., a publicly traded
Bethlehem, Pa.-based identity management firm. "If you're the
perpetrator you can skate around the alert."
States might be better off putting some of the burden on, say, banks to
do a better job of screening who's applying for a credit card, DeFranco
said.
=================================
02. Program to track foreign visitors gets mixed reviews - Border
loopholes: Critics say too many people arriving in the United States
are exempt from the regulations - By Nicole Gaouette - Los Angeles
Times - Salt Lake Tribune - Dec 31, 2005
Source
Next Contents
Four years after the Sept. 11 attacks, the Bush administration has
finished installing the equipment for a system to identify, photograph
and fingerprint visitors arriving at every land, sea and air port in
the country.
The absence of a reliable system for tracking visitors was
identified as a serious national security gap as the U.S. reassessed
its counterterrorism efforts in the wake of Sept. 11. The new program,
called US-VISIT, is the country's first comprehensive system to track
foreigners and check their information against criminal and terrorist
watch lists.
Described as the ''greatest single advance in border
security in
three decades'' by former Homeland Security Secretary Tom Ridge, it is
not yet fully operational and has been dismissed by critics who charge
that the program's loopholes and its slow implementation have done
little to improve national security.
Even so, observers applauded the news. ''This is a
good-news
story,'' said Clark Kent Ervin, a former DHS inspector general and
director of the Homeland Security Initiative for the nonpartisan think
tank the Aspen Institute. ''It's a very, very good first step.''
But there were caveats. ''At airports, [US-VISIT] has made
a great
difference,'' said Jessica Vaughan, a senior policy analyst with the
Center for Immigration Studies. But, she said, even though it has been
installed at land points, it is not being used on most people passing
through.
US-VISIT first debuted in January 2004 with the
installation of
biometric equipment at airports and seaports. By December of that year,
the program had been expanded to the 50 busiest land border crossings.
On Dec. 19, DHS met a deadline set by Congress to equip the remaining
land crossings by year's end.
United States Visitor and Immigration Status Indicator
Technology -
its full name - is in place at 154 land crossings, 15 seaports and the
115 airports that handle international travel. At these checkpoints,
visitors must stop to pose for a digital photo and let border agents
take digital impressions of their two index fingers.
But not everyone who passes through is subject to the
program. U.S.
citizens, Canadians, most Mexicans, permanent legal residents and
diplomats are exempt, so that of the 90 million people who passed
through an airport or seaport in 2004, only 42 percent had to stop to
have their data recorded.
At land crossings, where 335 million people entered the
United
States in 2004, that figure dropped to 1 percent, according to Anna
Hinken, a spokeswoman for US-VISIT.
''From a national security perspective, the problem isn't
so much
that Mexicans and Canadians aren't screened, but that a terrorist group
or someone a lot more dangerous than a Mexican busboy will show up,''
Vaughan said. ''If someone from Riyadh [Saudi Arabia] figures out they
can come through from Mexico with a stolen card, they could probably
get through.''
Another potential flaw is that, apart from a few pilot
programs, the
program does not yet track visitors as they leave. That shortcoming
handicaps the program's national security function as well as its role
as an immigration tool, as visa overstays are estimated to account for
up to half of illegal immigrants. ''You need both an exit feature as
well as an entry feature,'' Ervin said. ''Unless you have both ends,
the system still isn't operational.''
==============================
03. Homeland
Security still lacks cohesion and efficiency, report says - BY
JAMES GORDON MEEK - New York Daily News - The Mercury News - Dec 29,
2005
Source
Next Contents
WASHINGTON - The Department of Homeland Security, the sprawling agency
created to defend the country against terrorists, is a bureaucratic
mess plagued by "major management challenges," a scathing internal
report charged Wednesday.
"While DHS has made progress, it still has much to do to establish a
cohesive, efficient and effective organization," the department's
inspector general concluded.
"Major challenges - now that is an understatement," said Rep. Carolyn
Maloney, D-N.Y., who chairs the Democrats' Homeland Security Task
Force. "You only need look at their response to Hurricane Katrina to
see they have major challenges."
Inspector General Richard Skinner did just that, singling out Homeland
Security's Federal Emergency Management Agency for "weaknesses"
managing relief contracts after hurricanes Katrina and Rita clobbered
the Gulf Coast this year.
"When one considers that FEMA's programs are largely administered
through grants and contracts, the circumstances created by Hurricanes
Katrina and Rita provide an unprecedented opportunity for fraud, waste
and abuse," the inspector general said.
The federal Katrina Fraud Task Force has led to 122 cases against 147
people charged so far with trying to rip off taxpayers, Justice
Department spokesman Bryan Sierra said Wednesday.
Skinner said that the management problems he identified will determine
his priorities for next year's audits, inspections and evaluations -
including a promise to "maintain an aggressive" effort to scrutinize
border security.
The border security agencies also are struggling to integrate
intelligence into daily operations or match border entry screening
systems with the FBI's fingerprint database, Skinner found.
He recommended merging Customs and Border Protection with the
Immigration and Customs Enforcement Service. "More than two years after
their creation, CBP and ICE have not come together to form a seamless
border enforcement program," the report said.
Homeland Security Secretary Michael Chertoff responded Wednesday that
he won't heed the advice.
This week, Democrats on the House Homeland Security Committee railed at
"33 unfulfilled promises" by Homeland Security since 2002, including
not protecting ports and other critical infrastructure, such as
electric grids, water systems and the Internet.
==============================
04. Research Abstract - Upgrading NetWare NDS Environments: Options and
Business Value by Quest Software - June 2005
- VENDOR WHITE PAPER - (.pdf) (266 kb) - 20 pages
Full
Paper Available Here Next Contents
Abstract - Overview:
During the past few years, many organizations have been actively
examining the value provided by the directory services on their legacy
network operating systems (NOSs) and the reality of having more than
one vendor providing that directory service/NOS capability within their
IT infrastructure. Due to historical factors, some of these
capabilities are based on Novell systems. Such considerations are
leading a significant percentage of these organizations to seriously
look at consolidating those systems and retiring Novell's presence,
migrating to a single directory service/NOS system where feasible.
When upgrading or consolidating their network operating system
environments, organizations evaluate their enterprise identity
management and directory service capabilities. These services can
deliver customer value through use as a repository storing critical
identification and credential information for resources and
applications.
Network operating systems use identity management and directory
services to deliver a centralized location and management point to: 1)
administer and control access to file and print services; and 2)
coordinate support for core application services such as e-mail.
These services also expand to include support for e-business identity
infrastructures as an application resource for user credential
authentication information.
Novell and Microsoft are key operating system providers that have
extended their capabilities in this area. When enterprises decide to
conduct a significant operating system refresh, many will re-evaluate
preferences and needs related to these core capabilities.
A pivotal decision point often occurs when enterprises evaluate a move
forward from Novell's NetWare to Novell's Open Enterprise Server. Such
evaluations will frequently include consideration of Microsoft's
Windows Server environment as an alternative.
This paper looks at the background behind these migrations, identifies
the underlying benefits supporting them, and provides our view of best
practices for a successful migration. These submissions are supported
by client feedback, a survey, and three case histories that provide
insight into the experience of typical organizations undertaking a
Novell-to-Microsoft transition.
=============================
05. U.S. Installs
Visitor Tracking Stations - The US-VISIT program to collect information
on incoming foreigners and screen them steps toward full operation.
- By Nicole Gaouette - Los Angeles Times - Dec 31, 2005
Source
Next Contents
Four years after the Sept. 11 attacks, the Bush administration has
finished installing the equipment for a system to identify, photograph
and fingerprint visitors arriving at every land, sea and air port of
entry in the country.
The absence of a reliable system for tracking visitors was identified
as a serious national security gap as the U.S. reassessed its
counterterrorism efforts in the wake of Sept. 11. The program, called
US-VISIT, is the first comprehensive system to track foreigners and
check their information against criminal and terrorist watch lists.
Described as the "greatest single advance in border security in three
decades" by former Homeland Security Secretary Tom Ridge, it is not yet
fully operational and has been dismissed by critics who say the
program's loopholes and its slow implementation have done little to
improve national security.
Even so, observers applauded the news that the Department of Homeland
Security had finished laying the foundation for the ambitious program.
"This is a good news story," said Clark Kent Ervin, a former Homeland
Security inspector general and director of the Homeland Security
Initiative for the Aspen Institute, a nonpartisan think tank. "It's a
very, very good first step."
But there were caveats. "At airports, [US-VISIT] has made a great
difference," said Jessica M. Vaughan, a senior policy analyst with the
Center for Immigration Studies. But, she said, even though it has been
installed at land points, it is not being used on most people passing
through.
US-VISIT debuted in January 2004 with the installation of biometric
equipment at airports and seaports. By December of that year, the
program had been expanded to the 50 busiest land border crossings. On
Dec. 19, Homeland Security met a year-end deadline set by Congress to
equip the remaining land crossings.
United States Visitor and Immigration Status Indicator Technology — the
program's full name — is now in place at 154 land crossings, 15
seaports and the 115 airports that handle international travel. At
these checkpoints, including six in California that include Los Angeles
International Airport and the Tijuana-San Ysidro land crossing,
visitors must pose for a digital photo and let border agents take
digital impressions of their index fingers.
But not everyone who passes through is subject to the program. U.S.
citizens, Canadians, most Mexicans, permanent legal residents and
diplomats are exempt, so of the 90 million people who passed through an
airport or seaport in 2004, only 42% had to stop to have their data
recorded.
At land crossings, where 335 million people entered the United States
in 2004, that figure dropped to 1%, said Anna Hinken, a US-VISIT
spokeswoman.
"From a national security perspective, the problem isn't so much that
Mexicans and Canadians aren't screened, but that a terrorist group or
someone a lot more dangerous than a Mexican busboy will show up,"
Vaughan said. "If someone from Riyadh figures out they can come through
from Mexico with a stolen card, they could probably get through."
Another potential flaw is that, apart from a few pilot programs,
US-VISIT does not yet track visitors as they leave. That shortcoming
handicaps the program's national security function as well as its role
as an immigration tool, as visa overstays are estimated to account for
up to half of illegal immigrants.
"You need both an exit feature as well as an entry feature," Ervin
said. "Unless you have both ends, the system still isn't operational."
In early December, Homeland Security Secretary Michael Chertoff offered
no timetable for beefing up exit tracking. "I have to say it's a
complicated question," Chertoff said at a news conference. "We've got
some pilot programs. We want to evaluate the utility and what we may
want to do to retool that process."
Some critics charge that Homeland Security has dragged its feet on an
exit program, saying the department doesn't want to know how many visa
violators there are because it lacks the resources to track them down.
Defending the department, Hinken said Homeland Security faces the
challenge of creating a tracking system where none existed before.
Unlike many other European and Asian countries, the U.S. has not
required international travelers to go through immigration checkpoints
as they depart.
"It's a building block, we have to start somewhere," said Hinken of
pilot exit programs at 13 airports and five land crossings. "In the
coming year, we'll evaluate. [At airports] the answer might not be a
workstation, it might be part of the checkout process. We believe in
testing so we don't roll out something that doesn't work and holds up
traffic."
Since January 2004, the US-VISIT system has processed 44 million people
and has snared 970 people with criminal or immigration violations.
Apparently, no one was stopped for ties to terrorism.
Among problems being worked out is the system's incompatibility with
the FBI fingerprint database. Homeland Security is revising its
fingerprinting practices.
Congress first ordered the now-defunct Immigration and Naturalization
Service to develop a way to track entries and exits in 1996, after the
1993 World Trade Center bombing. Pressure to create the program surged
again after the terrorist attacks in 2001, with both Congress and the
Sept. 11 commission calling a tracking system "essential."
But even before its debut in 2004, US-VISIT encountered criticism. In
2003, the General Accounting Office called the program "risky" because
its costs could escalate rapidly. Although it has racked up a
$1-billion price tag to date, some estimates put the final cost as high
as $14 billion.
================================
06. Security becomes a touchy proposition - By Mike Berman -
Scripps Howard News Service - December 31, 2005
Source
Next
Contents
What if I told you that there's nothing more powerful than the first
finger of your right hand? Even that superdude in tights would wish he
had that much power.
Welcome to the world of biometrics and the future of security for your
PC. Verifi FingerTouch Security Professional ($99) from Zvetco
Biometrics lets your fingers do the surfing while protecting your
valuable information from prying eyes.
Setting the system up was fairly simple. The fingerprint reader
attaches to a USB port on your computer and the Verifi ID Manager
software had me up and running in minutes.
The fingerprint reader included with the kit is the P3400, which
retails for $92, and the software has a retail price of $32 if bought
separately, so buying the kit is basically a no-brainer.
Obviously everything in the world of computing isn't perfect and this
system is not without its flaws. Unless you place your finger on the
reader in the exact position it recorded when you set up the software,
it won't recognize it.
Very often it would take several attempts before I could gain access to
my computer.
So, you ask, how does it work? According to the folks at Zvetco, the
reader uses more than 9,000 elements to create a digital pattern that
mimics the fingerprint's underlying structure. Simply put, it looks
below the surface of the skin and into the living tissue. This, they
say, ensures a high-quality image, and could account for its being
extremely picky when you try to gain access to your computer.
For more information, check out everifi.com.
Contact Mike Berman at jocgeek@earthlink.net or
through his Web site at
jocgeek.com.
Key Features
It's compatible with Windows 98, 2000, ME and XT.
The sensor uses True Print technology at 500 dpi.
You can personalize your logon to include just a fingerprint or a
fingerprint plus a password.
You can set up an e-wallet that is accessible only via your fingerprint.
It can remember logons and passwords, restricting -- and automating --
access to protected Web sites and other sensitive information.
You can restrict access to any program on your computer by using the
Application Secure feature.
Secure Disk can set up a secure partition on your hard drive,
encrypting and limiting access to sensitive information.
===============================
07. Press Release
(US Department of Homeland Security) - DHS Completes Foundation Of
Biometric Entry System - Represents Major Advance to Immigration and
Border Management - Dec 30, 2005
Source
or Source
Next
Contents
WASHINGTON, Dec. 30 /PRNewswire/ -- Department of Homeland Security's
(DHS) US-VISIT program has completed installation of biometric entry
capabilities at 104 land border ports, as mandated by Congress.
Biometric entry capabilities are now deployed at all fixed ports of
entry open to US- VISIT travelers.
"The U.S. Government's efforts to strengthen our nation's immigration
and border management system have taken a giant leap with the
deployment of US- VISIT entry capabilities at all our ports and
visa-issuing posts abroad," said DHS Secretary Michael Chertoff.
"US-VISIT is making America safer by enhancing our border management
system with next-generation technologies and processes to address the
emerging threats, challenges, and opportunities of our 21st century
world."
US-VISIT installed biometric entry procedures at the 50 busiest land
border ports along the U.S.-Canada and U.S.-Mexico land borders as of
December 29, 2004; meeting the December 31, 2004 deadline. The
deployment of biometric entry procedures to each of the remaining 104
land border ports of entry is also ahead of the congressional deadline
of December 31, 2005.
US-VISIT is a continuum of security measures that collect biometric and
biographic information from visitors at U.S. visa-issuing posts upon
their arrival and departure from U.S. air, sea and land border ports.
The program enhances security by verifying each visitor's identity and
by comparing their biometric and biographical information against watch
lists of terrorists, criminals, and immigration violators.
Since January 2004, US-VISIT has processed more than 44 million
visitors, which makes the program the largest-scale application of
biometrics in the world. Biometrics have enabled US-VISIT to intercept,
at U.S. ports of entry, more than 970 people with histories of criminal
or immigration violations, including federal penitentiary escapees,
convicted rapists, drug traffickers, individuals convicted of murder,
and numerous immigration violators.
Additionally, the State Department's BioVisa program, which is fully
integrated with US-VISIT, has resulted in over 14,000 hits on
individuals applying for visas to travel to the United States.
At many land border ports of entry, US-VISIT has decreased processing
time in secondary inspection as a result of the automation of Form I-94
issuance process and US-VISIT's simple, fast and clean biometric
processes.
US-VISIT currently applies to all visitors entering the United States,
regardless of country of origin or whether they are traveling on a
visa, with certain exemptions. Canadian citizens are exempt, as are
most Mexican visitors who apply for admission using a Border Crossing
Card, also known as a laser visa and travel within the border zone
during the 30 day time limit.
For more information, visit http://www.dhs.gov/us-visit .
Website: http://www.dhs.gov/us-visit
=======================================
08. Speedier
airport access in works - Convenience programs allow travelers to
bypass long security lines by offering pre-screening services for a fee.
- By CANDI CALKINS - Palm Beach Daily News (Florida) - Dec 31, 2005
Source
Next Contents
Longer lines and increased traffic may be signs of the season
throughout Palm Beach County, but at Palm Beach International Airport
the numbers tell the story. There are 203 commercial flights scheduled
for January 2006, up from 147 flights in September.
"The planes don't come in empty," said Lisa De La Rionda, the airport
director of noise abatement and community affairs. While 575,823
travelers arrived or departed from PBIA in November, setting a record
for that month, about 839,287 airplane seats will be available for
January travelers.
Growing traffic at PBIA is not just a seasonal issue, however. There
were 197 flights in January 2005. More than 7 million passengers
arrived or departed from PBIA in the 12 months ending Nov. 30, a 7.8
percent increase over the previous 12-month period.
With the Transportation Security Administration's December announcement
that more passengers will be subjected to random screenings at airport
metal detectors, the prospect of navigating security may leave many
travelers dreaming of ways to bypass those long lines. What if airports
offered a fast-track lane for busy people whose time is worth money?
The idea already is being tested.
In the wake of the Sept. 11, 2001, terrorist attacks, lines expanded as
American airports beefed up security measures.
TSA responded with a Registered Traveler Pilot program at five
airports: Minneapolis-St. Paul, Los Angeles, Houston, Boston and
Washington, D.C. That government-run pilot program used biometric
scanning but was shut down in September.
A similar program, Clear, which has been operating at Orlando
International Airport since July in a partnership with Verified
Identity Pass Inc., now has 12,000 subscribers who pay a $79.95 fee for
the convenience. Members submit fingerprints, iris scans and
applications for background checks conducted by TSA. Swiping an ID card
at an airport checkpoint, along with a fingerprint or eye scan, admits
Clear members into a separate security lane.
Cindy Rosenthal, spokeswoman for Verified Identity Pass, said members
usually wait no more than 14 seconds, "so you've avoided the entire
wait." She said Clear members are not subjected to additional
screenings. Currently, the Clear program is available only at the
Orlando airport.
"It's not a full-fledged program that is automatically going to be
rolled out across the nation," said Lauren Stover, TSA's South Florida
spokeswoman. She said that in mid-2006, after Clear completes one year
of operations, TSA will evaluate the results and how registered
traveler programs may be applied at other airports.
"It appears to be going very well," Stover said. She said TSA is
interested in leveraging private sector resources to offer the service
and would be willing to work with PBIA and other airports to implement
similar programs.
TSA has issued a timetable for developing a nationwide registered
traveler program in the "Briefing Room" section of its Web site,
www.tsa.gov,
and is expected to announce detailed plans by mid-2006.
De La Rionda said PBIA is waiting for TSA's analysis. "Obviously, our
options will be considered once additional information is available of
the formalized plan."
"It is each airport's decision to launch such a program at their
airport or airline," Rosenthal said.
While TSA handles airport security in partnership with individual
airports, she said some terminal buildings are controlled by specific
airlines, complicating the issue of who would supervise a nationwide
registered traveler program.
Rosenthal said many requests for the program come from the Palm Beach
County area. "We get the big cities, too — Chicago, Los Angeles — but
we really do get a lot from West Palm Beach."
Rosenthal said she personally traveled through PBIA when visiting her
parents during the holidays. "I know that I have stood in those lines
that have been way backed up," she said. "I always chalk it up to being
all the holiday travelers."
Rosenthal said that Verified Identity Pass has a contract with the
airport in San Jose, Calif., but has not yet launched a program there.
The company also is negotiating with airports in Sacramento, Calif.,
and Indianapolis. "But it is all airport by airport. It's not like we
can implement ourselves anywhere."
Verified Identify Pass has an early start, but other companies will be
competing for the chance to provide expedited clearance.
Saflink Corp., a security company based in Bellevue, Wash., is
partnering with Microsoft, Johnson Controls, Expedia Corporate Travels
and ID Tech Partners to create a similar registered traveler program.
Tim Wudi, Saflink's chief marketing officer, said the company is
proposing an airport clearance card that doubles as a credit card.
Wudi said surveys have shown that many frequent business travelers
would be willing to pay $80 for the convenience of a card they could
use to avoid long waits while purchasing coffee or reading materials.
"You have something that you never really leave home without anyway."
He said Saflink wants to work with airports to provide registered
travelers with discounts on parking and coupons valid at airport
concessions. "We anticipate fairly significant discounts and incentives
that will make the consumers' decision to do this very easy."
Saflink, which has provided security services for more than 35 years to
military and public-sector projects, is also developing prototypes for
the security kiosks or turnstiles and other equipment that airports
would need for a prescreened passenger program.
"At this point none of the airports has done anything other than look
for information," Wudi said. He said he expects five to 10 airports may
be issuing requests for proposals within the next three months, "so
we'll be active in those when they do that."
However, Wudi said Saflink is waiting for TSA to issue more specific
policies and operational requirements.
Saflink wants to develop equipment that can be used by members of
multiple registered traveler programs at any airport in the nation.
"It's the government that needs to get going," Wudi said. "We need to
know how the government is going to issue a policy so we can build
equipment."
===============================
09. Scrapping of
elections imminent, Haiti on the verge of another crisis -
Dominican Today - Dec 30, 2005
Source
Next Contents
Electoral crisis could become a political crisis as anti-government
protests increase
PORT-AU-PRINCE.- The Haitian authorities will announce this Friday a
new postponement of the presidential and legislative elections,
revealing Haiti’s difficulties in finding stability two years after
president Jean Bertrand Aristide’s ouster.
Last week, Provisory Electoral Council (CEP) president Max Mathurin had
requested an extension of a few days to evaluate the January 8
elections’ technical feasibility.
Since then, the declarations from Haitian leaders leave no doubts of
the new delay, the fourth this year.
"It is more and more probable that the elections will not be able to
take place in the announced dates," member of the CEP told the press.
"We cannot guarantee honest and credible elections," said Pierre
Richard Duchemin, in charge of the CEP’s electoral registry.
The elections, initially programmed for November 13, were successively
postponed for November 20, December 27 and January 8.
Close to one week before the first electoral balloting, under United
Nations supervision, the authorities were unable to distribute the 3.5
million new biometric identity cards to the electorate, made in Mexico,
which would have allowed them to vote.
For their part, provisory president Boniface Alexandre and prime
minister Gérard Latortue have stated their desire for the
Council can
establish "a more realistic" calendar, without specifying a new date.
Whereas the commercial attaché of the United States in Haiti,
Timothy
Carney, called on the CEP "to take their time before presenting another
calendar", recognizing that the complex electoral process was "in a
country that has known fatal upheavals in the political, social and
economic plane."
This electoral crisis could become a political crisis at a time when
anti-government protests increase.
Some political parties that participate in the electoral contest
threaten to take the Electoral Council to court for what they consider
serious damages due to the numerous delays, and protest against "the
foreign influence in the electoral process." Others demand the
Government’s resignation as a "sanction" for the electoral crisis.
A group of 20 parties, members of the National Council of Political
Parties, demanded the ouster of Gérard Latortue and the
formation of a
national coalition government in charge of organizing the elections 90
days after taking office.
===============================
10. Today's Budget
Tomorrow's Plan - By Doug Henschen - Intelligent Enterprise
-
January, 2006
Source
Next Contents
Better access to information is a leading theme in readers' 2006 IT
budgets, with document management, portals, dashboards and enterprise
reporting all comanding more investment. Mobile and wireless solutions
and service oriented architecture top future technology adoption plans,
but here's why security trumps all other trends behind the spend.
As anyone who manages a household budget can attest, there are
necessities and then there are niceties. Planning ahead, these budget
keepers probably know they'll have to spend more on necessities like
energy and, thanks to all the hurricanes, homeowners insurance in 2006.
Then, perhaps, there will be money left over for niceties like
finishing the basement or some landscaping.
So it goes for organizations setting technology priorities, although
it's a bit more complicated. For one thing, there are many more
"owners," each with different priorities. Then there's the tendency for
last year's nicety to become this year's necessity — do you remember
when data warehousing was exotic? Finally, much more than pride is at
stake in keeping up with the corporate Joneses; today's "speculative"
investment might lead to big market gains or improvements in
profitability.
To get a sense of our readers' technology priorities, our Intelligent
Enterprise Strategic Management Survey explored 2006 spending plans in
28 categories and drilled down on adoption plans for 27 leading-edge
technologies. Some of the results surprised us, starting with the fact
that security and privacy were at or near the top of both lists. Other
priorities were more predictable and fell into the theme of improving
information access.
Tighter security and better information access are longstanding IT
imperatives (and in some ways work at cross purposes), but cost factors
and influences can change dramatically from year to year. Let's look at
the technology trends and regulatory and business pressures setting
today's agenda, starting with our take on why security now trumps other
imperatives.
First, Protect the Data
We were perplexed when we got our first look at the survey results
related to 2006 budgets and technology interests (see "Listening Posts"
at right and on the following page). More than half the readers we
surveyed said they'll spend more on security, privacy and identity
management in 2006, and nearly equal interest was expressed in security
and privacy technology innovations. It's not that security and privacy
issues aren't on our radar, but we hardly expected them to rank first
for increased 2006 spending and second in future interest.
A look at the breakdown of respondents helped clear things up, with
nearly 60 percent of the sample representing bank, insurance, financial
service, health care, government, defense, retail, telecom, education,
media/marketing and outsourcing firms. These firms are managing and
analyzing sensitive information, and when consumer information is
involved, there's usually a regulatory compliance demand on the front
burner.
The Healthcare Information Portability and Accountability Act (HIPAA)
got teeth last April, with an initial deadline passing for health-care
providers, health plans and payment clearinghouses to protect
electronic health information. In March, four federal agencies issued
new information security rules for U.S. Banks. Citing the
Graham-Leach-Bliley Act, the FDIC (Federal Deposit Insurance Corp.),
the Board of Governors of the Federal Reserve System, the Office of the
Comptroller of the Currency and the Office of Thrift Supervision
required banks to inform customers in the event their personal data is
exposed due to a security breach. And in July, a Federal Information
Security Management Act (FISMA) deadline kicked in requiring all the
federal government's 8,623 IT systems to be certified and accredited as
secure.
California's Security Breach Information Act (SP 1386) has been the
model for legislation on data-breach notification, and together with
new bank rules, it forced a series of high-profile revelations about
consumer data security breaches — by ChoicePoint, Citigroup, Bank of
America, LexisNexis and MasterCard, among others. Nothing generates
legislation like scandal, so now a gaggle of federal-level information
security and privacy bills are floating around Capitol Hill (see our
Dashboard story).
The costs of negative publicity are far steeper than basic improvements
in security. First steps include adding more robust network firewalls,
application firewalls, intrusion-detection systems and developing more
rigorous patch and virus protection routines. Encryption is a next step
that makes sense for information such as trade secrets and sensitive
data on laptops, but it's expensive and a full-employment program for
DBAs when applied more broadly. DBMSs (database management systems) and
BI (business intelligence) systems often provide or support encryption
methods, but few companies implement them systematically because it's
difficult and expensive to rework applications designed to use
unencrypted data.
Web services and service-oriented architectures present unique security
challenges that demand devices such as XML security gateways. These
gateways were once a burgeoning area for specialty companies, but
leaders including Sarvega and DataPower have been snatched up by Intel
and IBM, respectively.
Our readers aren't often the front-line security watchdogs, but it
appears that regulatory compliance demands and, more importantly, the
threat of negative publicity have made their mark on budget priorities.
Improve Access
Part of the reason security challenges are getting tougher is that
organizations are doing everything they can to make it easier for those
they trust to access information and applications. Half of the
Intelligent Enterprise readers polled confessed that their
organizations make poor decisions because users can't get enough good
information. No wonder content and document management, portals,
performance scorecards and dashboards and enterprise reporting ranked
second, third, fourth and sixth, respectively, among 28 categories for
possible increased spending in 2006.
What's behind the demand for content and document management? You've
probably heard that 80 percent of information in the enterprise is
"unstructured" — meaning documents, reports, e-mail messages, Web pages
and other content not typically stored in databases. What you may not
have heard is that 80 to 90 percent of that content usually isn't
managed.
While data warehouse and BI pros may gripe about data stores that
remain untapped, the gaps on the structured side are tiny compared to
the canyons of unmanaged content. A statistic from IBM is telling: The
acknowledged leader in enterprise content management (with 20 percent
of the ECM market by some estimates), IBM reported in 2004 that it had
some 11,000 corporate ECM customers compared to about 400,000 DB2
customers.
IDC studies project only modest ECM growth of about 9 percent over the
next few years, but industry giants Microsoft and Oracle are counting
on a bigger, broader market for a lower-cost, every-seat style of basic
document management in the form of Microsoft SharePoint and Oracle
Content Services. SharePoint had already racked up some 32 million
seats by last summer. Oracle says between Content Services (introduced
last summer) and Oracle Files, it has more than 2,600 enterprise
customers and "millions" of seats. IBM offers Workplace Documents as a
basic document management tool, but at present it seems more focused on
its ECM offerings.
Portals, too, will draw more of your dollars this year. The latest
enhancements to portals include collaboration and content management
features as well as access to reports, KPIs, scorecards and business
activity monitoring (BAM). Portals are also interacting with
applications, composite applications and processes.
Plumtree was well down the application interaction path when it was
acquired by BEA last fall. That deal effectively marked the end of the
stand-alone portal era, with the market consolidating to the
infrastructure vendors, such as IBM, BEA, Sun, Oracle and Microsoft,
and application vendors, including SAP, BEA's Plumtree lineup, and the
other Oracle, meaning PeopleSoft and Siebel.
Microsoft dipped its toe in the application camp recently, adding 30
out-of-the-box applications for SharePoint Services, including absence
and vacation scheduling, meeting management, marketing campaign
management, loan initiation and case work management apps.
Will your portal be part of your infrastructure or your applications?
Either way, many organizations have made or will be making leaps to
service-oriented architecture to gain even better and more flexible
access. And either way, the portal is a given IT asset that requires
upgrades and reinvestment.
Give 'em a GUI
In the performance management and BI arena, our "performance scorecards
and dashboards" and "enterprise reporting" categories address access
and analysis imperatives, but we think the former is what's driving
most of the interest.
Scorecards and dashboards should be a sign of deeper performance
management initiatives aimed at improving planning and developing
clearer strategic goals. To manage toward those goals, top financial
and business executives need more detailed and timely information.
Scorecards help aggregate and display that information, and dashboards
deliver it to the key executives who need to react when business
conditions change.
The scorecard was invented for the purpose of measuring and comparing
performance against strategic and operational goals, and dashboards
were first "executive" dashboards designed to display up-to-the-minute
performance. The danger with these terms is that they're fast becoming
ubiquitous. So many products now feature "scorecards" and "dashboards,"
you have to wonder if this phenomenon is really about performance
management.
We put the word "performance" up front with a specific market in mind,
so we hope the 43 percent of respondents who said they're spending more
on scorecards and dashboards know what they're getting. Cross your
fingers that the scorecards are grading and the dashboards are dialing
into carefully selected variables tied to strategic performance
objectives.
Nearly 42 percent the readers we polled said they'll spend more on
enterprise reporting, the most visible example of the trend toward
"operational BI." Rather than hoarding intelligence at the top,
organizations know they must empower employees with information.
Enterprise reporting tools are giving a broader community of users
self-service access and more control over when and how they receive
their reports.
Enterprise reporting figured prominently in nearly all the many BI
suite upgrades in 2005, with examples including SAS's Web Report
Studio, Hyperion's SQR (picked up in the Brio acquisition), and
MicroStrategy's Report Services 8. Enterprise reporting is for
everyone, but as the casual user's gateway to BI it must be accessible
and easy to use. Thus, Web-based delivery and simple GUIs are musts.
For vendors, the trick is hiding enough sophistication and control
behind the scenes to please the analysts who drill down and design
their own reports.
Whether it's because users are clamoring for information on demand or
because BI gurus are tired of responding to special requests, our
readers are investing more in enterprise reporting.
What's Next?
Other aspects of your 2006 budget and technology adoption plans seemed
surprising at first, although less so upon closer examination. For
example, for what many consider a "mature" category there was
surprising interest in DBMSs, but then the footprint of the DBMS has
been steadily expanding. IBM, Microsoft and Oracle have been blending
in content management (as described earlier), BI and even data
integration into the DBMS, which may be helping drive upgrades.
Certainly Microsoft's recent and long-anticipated SQL Server 2005
release has many anticipating new licenses in 2006.
Looking at your interest in leading-edge technologies (see "Listening
Post" at right), we discussed security and privacy, but more than half
of the respondents also said they had either deployed or were testing,
planning to deploy or closely tracking mobile and wireless solutions.
It's a topic that network infrastructure publications have been all
over, and with all the alerts tied to key performance metrics,
processes and all forms of business activity monitoring, it makes sense
that our readers are interested, too. Why go to the trouble and expense
of getting to actionable, real-time information if you can only expose
it to users at desktops during business hours? Without anytime,
anywhere connectivity, all the talk about business responsiveness and
agility rings hollow.
Less surprising was the high interest in service-oriented architecture
and Web services (and the promise of faster, lower-cost, flexible and
responsive IT), data visualization (for deeper, yet clearer analysis
and understanding), 64-bit computing (for choke-free performance as the
number and complexity of queries mounts), and Radio Frequency
Identification and streaming data processing. The last two will go hand
in hand, although streaming processing is already used for rapid-fire
financial transactions and security incident detection.
How We'll Change
Thanks to the more than 1,131 readers who participated in our survey.
We learned a lot and have many more statistics we plan to share. More
importantly, we'll respond to your feedback by modifying and adding to
our editorial calendar. We've already been in touch with our colleagues
at Secure Enterprise to explore ways we could investigate encryption
and other data protection technologies and trends.
Graph that appeared in original article are not reproduced here. See: Source
===========================
11. Focus on
Signals, Not the Noise - Focus on finding data signals amid the noise.
- By David Stodder - Intelligent Enterprise - January, 2006
Source
Next Contents
The data explosion shows no signs of slowing. According to Winter
Corp.'s 2005 TopTen Program, Yahoo! has more than 100 terabytes of data
(actual; not storage space allocated, which is a misleading measure) in
its Oracle-based data warehouse (DW). This marks the first time that
Richard Winter's survey of the largest, most heavily used databases has
reported a system with more than 100 terabytes. AT&T runs a close
second, with almost 94 terabytes managed by its internally developed
"Daytona" system. The telecommunications industry generally has the
biggest databases, says Winter, with volumes rising in financial
services and insurance.
Securing such crown jewels — including unstructured content and
document sources, business processes, and strategic applications that
generate and use the data — is the top 2006 IT budget priority for
Intelligent Enterprise readers, according to our Strategic Management
Survey. To be sure, this month's cover package identifies other
objectives that vie for attention: but security, fraud detection,
privacy, identity management and the surrounding issues of regulatory
compliance dominate readers' agendas. Pick up any newspaper today and
you needn't ask why.
Alas, we do have to ask why most organizations still don't address
these challenges strategically, which would help them apply the full
force of their IT innovation and intelligence. "Compliance is proving
to be more of a distraction than a catalyst," notes Edwin Bennett,
global director of Ernst & Young's Technology and Security Risk
Practices, in the company's recent Global Information Security Survey
report. Bennett's view is that organizations are missing "the
opportunity to promote information security as a strategic imperative
to their businesses."
Mobile and distributed computing immediately come to mind as big tests
for information security pros; however, regulations are what draw the
interest of CEOs, CFOs and heads of corporate functions and lines of
business. Basel II, Sarbanes-Oxley, HIPAA and recent legislation such
as the Personal Data Privacy and Security Act force organizations to
take more visible responsibility for their entire ecosystems of
partners, outsourcing contractors, suppliers and customers. If they
don't, "the value created by these arrangements can quickly diminish or
disappear due to perceived or real security, privacy or identity
breaches," Bennett warns.
Will the New Year bring a tipping point, marking a new resolve to
address security, fraud, privacy, identity management and compliance in
a holistic and strategic fashion? Large firms in telecommunications,
health care and other industries have been applying data mining for
years to combat fraud; packaged solutions and services vendors are now
bringing this specialized knowledge into the midmarket. As we explored
in November, more companies are using risk analytics for a blend of
regulatory and strategic purposes. The clamor for auditing and activity
monitoring tools that can detect security and regulatory violations
will lead organizations to reconsider how they deploy operational data
stores and other time-sensitive repositories, as Michael Jennings
discusses ("Not Your Father's ODS").
With data pouring in on top of already bulging sources, the key
challenge will be to enable decision makers and automated systems to
sense the signals amid the noise: that is, pick up key information from
the background that protects the business from harm. Automated
compliance may be a common goal, reflecting a desire to shift focus to
more strategic matters. But with the stakes rising, companies that fall
short of gaining the ability to understand why something happened and
how to adjust for the future do so at their peril.
David Stodder is the editorial director and editor in chief of
Intelligent Enterprise.
See also Reader Survey - Voice of Our Readers: The 2006 Strategic
Management Survey
What's top of mind with Intelligent Enterprise readers? Seizing
information advantage, no matter what the technology obstacles are. And
they want vendors to step up
http://www.intelligententerprise.com/showArticle.jhtml?articleID=175002395
============================
12. Airport
Security Mkt. is About to Get More Bullish - Airport Business
-
Airport Security Report via NewsEdge Corporation - Dec 30, 2005
Source
Next Contents
The next few years present an excellent opportunity for investing in
firms that develop or sell airport-security equipment, according to a
new market analysis by the consulting firm Frost and Sullivan.
For one thing, the airport security market is giving all indications it
will start another boom period, following an initial rush of federal
spending that came on the heels on the 9/11 terrorist attacks. In 2003,
Transportation Security Administration (TSA) purchases from security
firms spiked at nearly $6.5 billion. That created a temporary
"overcapacity" of equipment, according to Rani Cleetez, a Frost
financial research analyst.
In the following year, 2004, aviation-security spending from TSA
dropped to about $2 billion. Recently, there has been an annual 20
percent increase in spending that Frost expects will continue into 2007
and 2008. This translates into another spike.
In fact, the top 30 firms in the field, which earned a collective $2.6
billion in 2004, are expected to bring in more than $6.1 billion in
2009. The global aviation services market is now worth $69 billion,
with 75 percent of that represented by airport security equipment.
North America and Europe account for 40 percent and 35 percent of that
smaller market segment of security equipment.
Furthermore, the "market mix" in both North America and around the
globe is not expected to change significantly over the next few years,
says Ken Herbert, Frost's global vice president, and co-author of the
analysis with Cleetez. "Market mix" refers to the regulatory, political
and economic conditions that can confound predictions for the growth
rate in particular industries or market segments.
Frost was founded in 1961 with a mission of "providing market
consulting on emerging high-technology and industrial markets
Within the airport-security equipment industry, the firm expects to see
particularly healthy growth rates in an unusually high number of
industry sub- segments, which are rank ordered in the box at right. But
Cleetez cautions against taking this ranking too literally, as there is
actually not that much separation between these sub-segments. For
example, the top-rated area, digital surveillance, is given a 22.4
percent projected growth rate and the second-place area, explosive
detection, will be at 21.9 percent. (The firm does not want to disclose
the exact growth rates in the other areas.)
Although Frost & Sullivan puts biometrics in the third position,
SITA's "Airport IT Trends Survey" released earlier this fall shows that
only about 3 percent of airports globally have deployed passenger
biometric identification systems. With issues such as reliability,
privacy and technical standards still being worked out, most airports
are probably in a wait-and-see mode. But as these issues are inevitably
resolved, SITA believes this percentage will jump to 33 percent within
the next four years.
Similarly, the use of radio frequency identification (RFID) technology
for baggage management remains on the periphery, with only 6 percent of
airports deploying it, SITA says. But by 2008 or 2009, RFID could make
a "serious impact" when that percentage could jump to 45 percent.
Adoption of RFID for cargo handling should be slower. While no airports
currently make use of this RFID application, the rate could be 22
percent in another five years. "The technology's high start-up costs
make the value proposition for individual airports unclear," SITA says.
The firm's survey, now in its second year, is supported by Airports
Council International and Airline Business magazine.
Meanwhile, Frost's Cleetez and Herbert note that numerous smaller firms
have jumped into the aviation security market, many since 9/11. To
survive, these smaller firms are going to have to make sure they have
enough money budgeted for research and development (R&D). In a
field with an emphasis on technological updates, change and innovation,
this is a critical area. Another factor is that TSA considers R&D
investments an important criterion in deciding whether to award
certification.
The larger security firms are able to invest heavily in R&D, and
it's a prime factor that keeps them on top. L-3 and Bioscrypt, for
example, invest as much as 12-18 percent of their revenue in R&D.
To compensate, smaller start-up firms will have to continue in their
efforts to attract venture capitalists who specifically agree to help
fund this area.
A different kind of market sub-segment involves small U.S. airports,
where there is an increasing awareness of security needs. Many have
already made significant purchases of digital surveillance and
explosive detection systems.
After North America, the next part of the world that is gearing up for
a boom is the Asia-Pacific region, Cleetez adds.
>>Contacts: Rani Cleetez, +91-44-52044523, rcleetez@frost.com;
Ken Herbert, 33 (0) 1-42-81-38-22, kherbert@frost.com; Thomas
Frankl,
SITA, +41 22 747 6296, thomas.frankl@sita.aero<<
Security Priorities
The following are Frost and Sullivan's 10 sub-segments of the airport
security industry as ranked by their growth rates from 2004-2009:
1. Digital surveillance
2. Explosive detection
3. Biometrics
4. Perimeter and access control
5. X-ray and infrared
6. Metal detectors
7. "Others" and integration
8. Closed-circuit television
9. Intercom and video door phones
10. Alarms and sensors
Source: Frost and Sullivan
==================================
13. Mexican thumbs-up
for Aussie fingerprint deal - The Australian - Dec 31, 2005
Source
Next Contents
AN Australian technology company is looking to break into the place
most visitors to Mexico would want to break out of - the nation's
infamous prison system.
But forget stories of tequila-filled jail wardens or sloppy tortillas -
Argus Solutions is helping bring Mexico's prisons up to speed in
curbing the trafficking of contraband into its facilities.
The move will help Argus, which develops biometric applications for
identity management, to crack the North American law enforcement market
from south of the border.
Argus recently signed a deal to sell its Australian-built fingerprint
identification technology to Mexico's prisons in what it hopes will be
the first of several sales in the North American market. While the
value of the deal is modest - about $40,000 - Argus chief executive
Bruce Lyman says it is an ideal launching point into the market.
Argus has teamed up with San Diego biometric firm ImageWare Systems to
provide the software behind the fingerprint identification technology.
"We had actually been targeting a lot of correctional services
opportunities that exist in California and Arizona," Mr Lyman said.
"(Then) this other opportunity came up.
"The nice thing about it for us is that it becomes a North American
market reference point for us."
The technology is now used in several Australian prisons to manage the
movements of visitors and prisoners.
"We want to manage people visiting, we want to manage them in, we want
to manage them through and we want to manage them back out - we want to
know where they are at any given time in the facility," he said.
"We want to do it in such a way that the person who was in here this
week is the same person who visits or is incarcerated in 12 months'
time. A lot of people are trying to make sure people don't change
identities and become part of that smuggling network."
Argus also provides iris scanning technology, which it hopes to sell in
North America alongside its fingerprint software.
While the technology would help slow drug trafficking, Mr Lyman said
the greatest advantage would be streamlined people management.
=========================
14. Review of
2005's most important immigration news stories - WorkPermit.com -
Dec 30, 2005
Source
Next
Contents
Workpermit.com brings you a summary of what we consider to be the most
monumental immigration news of 2005.
Australia launches biggest immigration drive in 40 years
As a result of a desperate need for new skilled immigrants, Australia's
Department of Immigration's decided to admit an extra 20,000 skilled
migrants this year, taking the 2005/2006 intake to almost 100,000. The
country is focusing on attracting workers from the UK and other parts
of Europe, holding expos in various countries. If you are considering
immigration to Australia, please visit the list of skilled occupations
and fill out our online assessment form. workpermit.com can help you
with the application process.
Eastern European immigrants transforming the UK
Although there were fears that low cost workers from the East would
steal jobs, Britain has absorbed these workers from the new European
Union member states with hardly a ripple. Unemployment is still low at
4.7 percent, and economic growth continues apace. Poles, Lithuanians,
Latvians and other Easterners are arriving at an average rate of 16,000
a month, a result of Britain's decision to allow unlimited access to
the citizens of the eight East European countries that joined the
European Union last year. The workers are reputed to be highly skilled
and highly motivated. Many have already begun investing in properties,
and plan to settle in.
Scotland's Fresh Talent Initiative a huge success, to be copied by
England soon
In 2005, Scotland launched its Fresh Talent Initiative, which allows
foreign graduates to live and work in Scotland for two years. The
policy was hailed as a major achievement, when it was revealed that
about 10% of all foreign students eligible to extend their visas had
done so. The scheme was so popular, in fact, that it began to annoy
university principals in England, who felt Scotland was being given a
special advantage to woo students in a lucrative international market.
England announced at the end of 2005 that it would be launching a
similar initiative.
England announces a new managed migration program
England announced a new migration scheme, to be introduced in spring
2005, including a five-tier point system for migrants, ranging from
easy access and full residence rights for the most highly skilled and
those with large sums to invest. Only the top two tiers of workers
would be allowed to bring families or have the chance to settle in
Britain after five years. The scheme calls for temporary entry permits
for low-skilled workers without their families, although this is
similar to what already exists, and biometric residence permits for all
foreign migrant workers without which they cannot work or access
government services. Although the new program came amid much publicity,
we at workpermit.com are uncertain how different it actually is from
current policy.
European Union considers work permit scheme
In the final days of 2005, the European Commission unveiled new plans
on economic migration to the European Union aimed at creating legal
alternatives to illegal immigration. In order to boost Europe's
attractiveness to highly qualified workers, the Union is considering
introducing an EU-wide work permit. The work permit would be introduced
by one member state but be valid throughout the 25-nation bloc. It will
be up to each member state to decide whether and how many people are
admitted every year, but Europe will deal with common standards, the
Commission announced.
2005 sees US torn over immigration policy
The United States struggled with its immigration policy in 2005. While
the country's IT experts fought for additional H1B visas, which allow
mainly high tech workers to work in the US, much of the public's
attention was diverted to the issue of illegal immigration. It is
acknowledged that illegal immigration benefits the economy because
those migrants are willing to take gruelling physical jobs that
Americans don't want, but American volunteers strongly opposed to
illegal immigrants set up border patrols along Mexico to stop the daily
flow of workers. At the end of 2005, the US's most recent decision has
been to build a fence along the border with Mexico, and not to increase
the number of H1B visas.
Rioting breaks out in France, Australia
Riots spread all over France as second and third generations of Islamic
immigrants, who are experiencing social discrimination, vented their
frustrations. The riots started in a few places throughout France in
late October and spread in November, forcing the French government to
declare a state of emergency. Similar rioting then broke out in
Australia, shocking the normally tolerant and laid back country. The
attacks amounted to the worst outbreak of ethnic violence in this
nation since Australia was established in 1901. On a positive note, the
riots have led to a great deal of soul-searching among all
nationalities of both countries particularly in Australia, which has
embraced the concept of a multicultural society, in which non-European
immigrants were not pressured to assimilate culturally into mainstream
society.
=============================
15. Middle East's
Security and Safety trade fair set for end January - Khaleej Times
- Dec 30, /2005
Source
Next Contents
DUBAI — Organisers of the region's largest Security, Safety, Fire and
Police event, "Intersec 2006", have announced that the eighth edition,
set for January 29 - 31 at the Dubai World Trade Centre, has grown by
30 per cent compared to its last showing.
Organised by Messe Frankfurt, it gathers together the world's
specialists in the areas of police, security, fire, health and safety.
More than 400 exhibitors are taking part including industry leaders
such as Panasonic, ADI International (Honeywell), Dedicated Micros,
Norbain, Simons Voss and Pelco.
Running parallel with Intersec is major conference programme presenting
crucially important information about contemporary security, fire and
safety issues. In fact, the programme is so up to date it includes
valuable but alarming case studies gleaned from experiences such as the
catastrophic terrorist attacks as recent as the London bombings in July.
Featuring acclaimed specialists such as Andrew Trotter QPM, Deputy
Chief Constable of the British Transport Police, Frank Cruthers, First
Deputy Commissioner of the New York Fire Department, and Simon Ancliffe
of Evacuation Strategies, the programme is a 'must see' event.
Intersec is being produced with the support and co-operation of many
local government departments, including His Excellency Lieutenant
General Dhahi Khalfan Tamin, Commander in Chief of Dubai Police and
Colonel Rashid Thani Al Matrooshi, Director of Dubai Civil Defence.
According to Imke Huelsmann, Intersec's show manager, "the growth and
success of Intersec is attributable to the increased number of
international companies recognising the opportunities that exist in the
Gulf area. Most GCC countries have major projects underway that require
increased attention to security and safety needs," she said. "Many of
the show's visitors come from Africa where many countries are investing
in new homeland security, border control projects and national ID
Cards."
In recent years Intersec has established specialist sections reflecting
these needs, particularly for Police, Fire and Health & Safety.
These are represented in four specialist zones under the identities of
MEPEC, MEFEC, MESH and MECSEC.
"MEPEC", the Middle East Police Exhibition & Conference, focuses on
suppliers of products and services for the police force and homeland
security, forensic equipment, biometrics, smart cards, armoured
vehicles and C4I.
"MEFEC", the Middle East Fire Exhibition & Conference is the
another core sector. It deals with civil defence and fire issues,
attracting exhibitors with products such as fire trucks, emergency
vehicles, smoke detectors, alarms, extinguishers and rescue equipment.
===========================
16. Today's America
a burden on the future - ICH - By Manuel Valenzuela - Mathaba.net
[UK] - December 30, 2005
[This lengthy essay is too long to reproduce here. It offers a very
pessimistic view concerning the use of security measures and other
factors to restrict civil liberties and generally control the
population.]
Source
or Source
Next
Contents
===========================
17. The Story
of Maher Arar: Unfolding US-Canada Police State - Center For
Research on Globalization - December 29, 2005
[This lengthy chronology sets out the sequence of events relating to
Maher Arar, beginning with his arrival at John F. Kennedy Airport in
New York on September 26, 2002, and ending with his October 5, 2003
release from Syrian prison. It is too long to reproduced here]
Source
or Source
Next
Contents
============================
18. APC Biometric Mouse Password Manager Review by
André Gordirro
- HardwareSecrets.com - Dec 29, 2005
Source
Next Contents
Introduction
Combining a mouse with a biometric device seems like a no-brainer. Yet
when APC first launched its Biometric Password Manager as a single
device it didn’t hit us that it should be someday incorporated into a
mouse shell. Now the company is releasing exactly that: a Biometric
Mouse Password Manager (aka BioM34) that enables mouse usage, password
management and file encryption in a single gadget.
The mouse per se would be a non-descript optical mouse if not for the
sensor on its back that allows for fingerprint reading. Dull gray and
with loud clicking buttons, the device is a somewhat big mouse that
performs its regular functions well – including gaming (it was put
through test on an online dispute of Battlefield 2).
The password management is on par with the previously released single
unit Biometric Password Manager: it’s done by APC’s proprietary
software, Omnipass. If you are a first time user, it will be a breeze
to install and run it; however, if you own a previous version, be
prepared for a bumpy ride.
Figure 1: The BioM34. -
http://www.hardwaresecrets.com/fullimage.php?image=2864
Installation and Finger Recognition
If you have no previous version of the Omnipass software in your
machine, just plug the mouse into an available USB port of your laptop
or CPU tower and insert the software CD to begin the Omnipass
installation. The program will then begin the process of “finger
enrollment” – that is, the recognition of your chosen fingerprint to
serve as your door to all websites and Windows applications. Just click
on the finger of your choice and then place it on the scanner on top of
the mouse. The software will then repeat the scanning eight times to
unsure a flawless reading. OmniPass can register up to 20 different
users or individual fingerprints.
Figure 2: Fingerprint selection.-
http://www.hardwaresecrets.com/fullimage.php?image=2866
This process is all very simple and intuitive. However if you do have a
previous version of the Omnipass software, it will not be that simple.
First, you have to uninstall the old version – the new one doesn’t just
upgrade over it. This is a drag because you have to remember to export
your old profile (to a folder of your choise, or even the desktop area)
– otherwise you’ll loose the bunch of passwords you’ve already
registered with Omnipass. In our case the uninstall feature had a few
problems and we had to reinstall the old version of the software just
so we could then uninstall it. It was very, very frustrating.
The frustration just increased when we tried to import the old
version’s profile: a conflict arose between the new registration we’ve
had to do when installing the software and the profile import. The
headache reached such a peak that we started the installation all over
again, this time dismissing the old profile import and deciding to
loose the passwords we previously had registered. It was an acceptable
loss due to such dire straits.
Password Registering and Browser Issues
Once you enrolled a finger, it’s time to run programs and visit
websites that ask you to log in. The OmniPass instantly recognizes a
password field and asks if you’d like to enter that particular username
and password into the database. It works beautifully – if you are an
Internet Explorer user. If you run Mozilla’s Firefox, however, you’re
lost in the woods. The Omnipass doesn’t support Firefox, although APC
has promised that this will change in the near future. If you are a
Firefox advocate, you should leave browsing password-requiring websites
(like Ebay, Hotmail etc) to Internet Explorer to fully enjoy the
features of your Biometric Mouse.
Figure 3: Password registering.-
http://www.hardwaresecrets.com/fullimage.php?image=2865
By clicking on the software system-tray icon you can access the
application controls. There you can manage users, enroll new fingers
and also chance settings. You can even change identities – multiple
same user accounts – so you can access passwords for work-related and
leisure time-related websites, for instance. To switch identities, just
select the one you’d like to use when you log in to OmniPass. The
application allows as many identities as the user wishes it.
Encrypting Files and Folders
Besides managing passwords, the Biometric Mouse also allows users to
encrypt and decrypt Windows files and folders. The OmniPass software
adds encryption options to the right-click menu in Windows. Encryption
adds a .opf extension to each file – so if you ever move the data to a
PC or laptop that doesn’t have the OmniPass software installed, they
cannot be decrypted. And be sure to decrypt all of your data if you
ever uninstall the program.
You can choose from a list of cryptographic service providers (CSP) on
the application settings. By default, RSA Data Security’s RC2 is
selected.
Figure 4: Encryption selection.
http://www.hardwaresecrets.com/fullimage.php?image=2867
Figure 5: Encrypted files.
http://www.hardwaresecrets.com/fullimage.php?image=2868
Specifications
* Wired optical mouse with two buttons, scrolling
wheel and
fingerprint reader.
* Weight: 0.4 lbs (180 grams)
* Height: 1.6 inches (4 cm)
* Width: 2.7 inches (6.8 cm)
* Depth: 4.7 inches (12 cm)
* Cord Length 6.00 feet (1.80 m)
* Interface: USB 1.1
* Average Price in the USA*: USD 50.00
* More information: http://www.apc.com
* Researched on http://www.pricewatch.com/ on
the day we published this
review.
Conclusions
Strong Points
* Enables mouse usage, password management and file
encryption in a
single gadget.
* Easy configuration and finger enrollment for first
time users.
* Never misread a fingerprint.
* The encryption feature is a big plus.
Weak Points
* Doesn’t support Mozilla’s Firefox browser.
* Complicated upgrade from previous version of the
software.
* Conflicting import between saved old profile and
the newly
created one.
See also: APC Biometric Password Manager Review at
http://www.hardwaresecrets.com/article/205
===========================
19. Press
Release - Identix experiencing growing demand for biometric
authentication systems with Fiscal 2006 orders exceeding $2.2 million
- SecureID News - December 29 2005
Source
Next Contents
Recent orders for its fingerprint readers totaling some $600,000 has
biometric technology provider Identix optimistic about future demand
for its authentication technology. Just half way into its fiscal year,
the company is already ringing up $2.2 million in sales which, it says,
are driven by the growing need for more secure access to companies'
PCs, particularly in the banking and healthcare industries.
Receives New Purchase Orders Totaling Approximately $600,000 for
Deployment of Fingerprint Biometric Authentication Solutions into
Commercial & Enterprise Logical Access Markets
MINNETONKA, Minn.-- Identix Inc. said it continues to see solid demand
for the company's biometric authentication technology in the commercial
and enterprise space. During its fiscal 2006 year, which began July 1,
2005 and ends June 30, 2006, Identix has already received more than
$2.2 million orders for deployments of its BioLogon authentication
software and enabling BioEngine authentication technologies and
accompanying single finger readers. Included in that total are the
recent orders for biometric logical access solutions for the banking
and healthcare markets, which have an aggregate value of approximately
$600,000. Identix expects to recognize revenues from these new orders
in its fiscal 2006 second and third quarters, ending December 31, 2005
and March 31, 2006, respectively.
Driven by the growing need for heightened security and the important
requirement for better identification prior to granting access to PCs,
company applications, and specific databases and company information,
leading commercial entities are continuing to adopt biometric
authentication solutions to safeguard sensitive information. Identix is
experiencing growing demand for biometrically enabled logical access
solutions in industries including banking, healthcare, and government
agency enterprise, which often require employees to access particularly
sensitive information.
"The benefits of biometric authentication for logical access in
enterprise and commercial markets are being realized across the United
States," said Identix President & CEO Dr. Joseph J. Atick.
"Industries such as banking and healthcare, where there is an
especially important requirement for the utmost confidentiality in
accessing records stored in PC and network databases, are leading the
way in recognizing the power of heightened security that biometrics can
add to any logical access application. Our biometric solutions are
easily integrated into existing workflows and help provide users with
the confidence that only authorized individuals are accessing certain
PCs and/or confidential records. We believe we may continue to see
growing adoption and deployment of biometric solutions throughout the
commercial and enterprise arena and are confident that Identix is well
positioned to capitalize on this prospective area of growth."
About BioLogon
Providing fingerprint and password support and designed to integrate
seamlessly into a network's OS for central administration,
configuration and maintenance of user account and security policies,
BioLogon offers complete multi-factor authentication solution. BioLogon
accepts multiple user account login methods, including biometrics and
PIN combinations, enabling increased security, lower administrative
costs, and added convenience.
About Identix Incorporated
Identix Inc. is the world's leading multi-biometric technology company.
Identix provides fingerprint, facial and skin biometric technologies,
as well as systems, and critical system components that empower the
identification of individuals in large-scale ID and ID management
programs. The Company's offerings include live scan systems and
services for biometric data capture, mobile systems for on-the-spot ID,
and backend standards-based modules and software components for
biometric matching and data mining. Identix products are used to
conduct background checks, speed travel and commerce via secure
identification documents, prevent identity fraud in large-scale
government and civil ID programs, and control access to secure areas
and networks. With a global network of partners, such as leading system
integrators, defense prime contractors and OEMs, Identix serves a broad
range of markets including government, law enforcement, gaming,
finance, travel, transportation, corporate enterprise and healthcare.
More information on Identix can be accessed via the company's web site,
www.identix.com.
=========================
20. Press
Release - Bioscrypt, HID and OMNIKEY team to develop a door-to-desktop
card solution - December 29 2005
Source
Next
Contents
A multi-factor authentication product co-developed by Bioscrypt, HID,
and OMNIKEY, will support fingerprint biometrics, contact and
contactless smart cards, proximity cards, common passwords and USB
tokens tokens, virtually eliminating a company's need for
multi-credentials.
Bioscrypt VeriSoft Access Manager Enables HID iCLASS and Prox Cards, in
Combination with OMNIKEY CardMan Readers, to be the Authentication Tool
for Access to Facilities and Computers
TORONTO-- Bioscrypt Inc., a leading provider of identity verification
technology, HID Corporation, the premier manufacturer of access control
cards and readers, and OMNIKEY, one of the world's leading
manufacturers of innovative smart card readers, announced today that
VeriSoft Access Manager will be the authentication software application
that allows cards to be used for access control to facilities and
computers.
With the introduction of VeriSoft Access Manager, Bioscrypt has
delivered a software application to market that promotes multi-factor
authentication, supporting fingerprint biometrics, contact and
contactless smart cards, proximity cards, common passwords, USB tokens,
virtual tokens and Trusted Platform Modules (TPM).
The inherent flexibility of the VeriSoft Access Manager application
permits organizations to unify user identities across the enterprise
with the authentication standard of their choice. In collaborating with
OMNIKEY and HID, an integrated solution has been developed that
provides off-the-shelf support for HID iCLASS contactless smart cards
and Prox cards for identity verification on computers.
"Bioscrypt is committed to providing the solution for secure access
control across the corporate enterprise whether to protect physical
assets or assets that reside within the information technology
network," said Robert L. Williams, President and CEO of Bioscrypt. "The
inherent flexibility of VeriSoft Access Manager offers organizations a
choice of authentication methods, whether it is single or multi-factor
and we look forward to working with OMNIKEY and HID in support of card
based user verification."
OMNIKEY CardMan(R) readers are economical PC-linked desktop readers
that help end-users to experience the convenience, speed, and security
of HID iCLASS or prox technology for desktop applications including
log-on to Windows(R), networks, web sites, and applications as well as
the secure storage of user names, passwords, and personal information.
"We are seeing that organizations are looking for ways to consolidate
the number of credentials required by their staff while maintaining if
not improving security," said Kurt Schmid, Chief Executive Officer of
OMNIKEY. "Specifically, companies are looking for ways to eliminate the
need for multiple credentials such as passwords. The combined
Bioscrypt/OMNIKEY/HID solution offers a single credential for
enterprise wide access control."
Bioscrypt initially began working with HID in May of 2002 with the
introduction of iCLASS technology in Veri-Series readers. Using HID's
iCLASS technology, users can read the unique serial number from their
iCLASS card and can read/write to the non-HID application area. The
read/write feature allows users to store passwords and other data
associated with the implementation of computer access. Information can
be securely encrypted and stored on the iCLASS card and then submitted
automatically for use with the appropriate applications.
"We are pleased that Bioscrypt's newest offering, VeriSoft Access
Manager, will allow end-users to use their HID iCLASS or proximity card
at the door and at the desktop," says Holly Sacks, Executive Vice
President of Marketing for HID. "This type of Innovation promotes the
fact that use of a single card for both physical and logical access
control is much more convenient and secure for both the enterprise and
the user."
With VeriSoft Access manager, users simply present their iCLASS card to
an RFID-enabled CardMan reader to unlock the power of their iCLASS or
prox card at the desktop! For end-users who currently use iCLASS
contactless smart cards or HID prox for building access, as a corporate
or student ID, or for transit or cashless vending applications, CardMan
RFID-enabled readers are the ideal solution for securing access to
Windows and the Internet world.
About OMNIKEY
OMNIKEY, one of the world leading manufacturers of innovative smart
card readers, offers the most diversified product portfolio available
on the market today. Having established a tight collaboration with key
decision makers in the card manufacturing and software industries,
OMNIKEY sits at the table of innovation. OMNIKEY's smart card readers
for PCs can be utilized by any application including logical access
control, digital signature, GSM authentication, secure banking and
online transactions, loyalty programs, and healthcare solutions.
OMNIKEY, headquartered in Walluf, near Wiesbaden (Germany), is part of
the ASSA ABLOY Identification Technology Group (ITG). OMNIKEY's
regional offices for North and South America reside in Irvine,
California with technical support in Atlanta, Georgia. The Asian
Pacific operation is located in Hong Kong. Design, production
management, and quality control of OMNIKEY's products are carried out
in the company's two R&D centers in Linz, Austria and Erfurt,
Germany. OMNIKEY readers are distributed worldwide through a global
network of partners, including value added resellers, system
integrators, and OEMs. For more information, visit the OMNIKEY Web site
at www.omnikey.com.
About HID Corporation
HID is the premier global supplier of contactless access control cards
and readers for the security industry. With over 250 million
credentials (cards, fobs and keys) in use worldwide, HID leads the
industry in 13.56 MHz and 125 kHz RFID card and reader technology for a
wide range of applications including access control, IT secure
authentication, time and attendance, digital cash/cashless vending,
automotive vehicle identification, and biometric verification. HID's
award-winning product line includes iCLASS(R) 13.56 MHz contactless
smart cards and readers, 125 kHz proximity, magnetic stripe, and
Wiegand technology cards and readers as well as the recently introduced
VertX(TM) CS central station managed access controllers. The company
also provides specialized card manufacturing services including custom
preprinted graphics, micro printing and anti-counterfeiting elements,
holograms or ultraviolet ink for increased card security. HID's
corporate offices are located in Irvine, California, with international
offices supporting more than 100 countries. The company is part of the
ASSA ABLOY Identification Technology Group. To learn more, please visit
www.hidcorp.com.
About Bioscrypt Inc.
Bioscrypt Inc. is a leading provider of identity verification
technology. The Company's solutions combine the convenience of touch
with the high security of fingerprint-based biometrics for simple and
secure access to facilities, equipment and information. Using the
"bioscrypt on board(TM)" brand, the Company offers packaged products,
OEM components and software licensing to leading security solution
manufacturers and integrators worldwide for physical, wireless and
network security applications. Among the many leading edge companies
and partners using Bioscrypt technology are the U.S. Army, NASA,
American Express, the New York Police Department, Kronos, NATO,
Continental Airlines, Intel, Atmel, HID Corporation, Honeywell and
Northern Computers. Bioscrypt's patented technology is interoperable
with leading fingerprint sensors and is both platform and operating
system independent. Bioscrypt is traded on the Toronto Stock Exchange
under the symbol BYT. For more information, visit the Bioscrypt Web
site at www.bioscrypt.com.
===================================
21. Press
Release - What big eyes you have...the better to hear you with -
Infrared communications system lets binoculars transmit sound. -
Eurekalert.org - Dec 29, 2005
Source
Next
Contents
Public release date: 29-Dec-2005
Contact: Colin Babb
babbc@onr.navy.mil
703-696-4036
Office of Naval Research
The six ships, one submarine, and more than 5,500 Sailors and Marines
of Expeditionary Strike Group (ESG)-1 are getting the chance to test
and evaluate a new low cost, low power, optical communications system.
The Office of Naval Research supported development of four prototype
systems, called LightSpeed, that use infrared light-emitting diodes
(LEDs) to communicate point to point.
The prototypes easily attach to current handheld and "Big Eyes"
binoculars to allow transmission of digital voice over a range of two
to five nautical miles, and could be used for communication between
ships at sea and platforms in the air and on the ground. LightSpeed
operates outside the radio frequency spectrum and has essentially
unlimited bandwidth. Efforts are under way with Naval Network Warfare
Command to seek approval of optical transmission of full motion video
and data at 1Mb/s.
Torrey Pines Logic, Inc. (San Diego), has been working on LightSpeed
technology since 2002, and came to the Navy's attention in 2003 when
Commander Gisele Bonitz of ESG-1 first saw it demonstrated. When Bonitz
wondered if LightSpeed could be used on ships, her command's science
advisor encouraged her to contact ONR's Tech Solutions office, which
runs a website through which Sailors and Marines can ask for--and
suggest--solutions to technology challenges
(www.techsolutions.navy.mil).
In 2004, Torrey Pines began receiving ONR funding through Tech
Solutions for prototype development, and also through its Information,
Electronics, and Surveillance Science and Technology Department to
develop an advanced beamsplitter. The company now receives Tech
Solutions funding for advanced prototype development and field testing,
with project management provided by SPAWAR Systems Center in
Charleston, S.C.
LightSpeed can be attached to any optical device and offers
simultaneous voice and data transmission; eye-safe, secure
communication; and an ultimate range up to the horizon. These benefits
could outweigh limiting factors such as necessity of maintaining line
of sight and degraded performance in dense fog.
Initial applications will focus on vessel boarding search and seizure
communications to pass biometric data back to ship, as well as ship
communications during "radio blackout" situations. LightSpeed
technology is also being considered for submarine communications with
aircraft, explosive ordnance disposal communications, unassisted UAV
landing/surveillance, flight deck personnel/asset tracking and
communications, and convoy communications.
==================================
22.
Immigration czar faces court backlog order - By Shaun Waterman -
Monsters and Critics.com - Dec 29, 2005
Source
Next
Contents
WASHINGTON, DC, United States (UPI) -- The Senate has confirmed the
president`s nominee to head the U.S. agency that naturalizes immigrants
-- just in time for him to face a federal court order to speed up the
issuance of Green Cards.
In a statement this week, Homeland Security Secretary Michael Chertoff
welcomed the confirmation of Emilio Gonzalez as the new director of the
Bureau of Citizenship and Immigration Services, the part of the
Department of Homeland Security charged with overseeing the process by
which immigrants become U.S. nationals.
But last week, a federal court ordered Gonzalez`s agency to start
giving out Green Cards to about 6000 people the immigration courts had
awarded legal permanent resident status to, but who had so far been
denied documentation, in some cases for several years.
Judge Marilyn Hall Patel of the U.S. District Court for the Northern
District of California issued the injunction to enforce a ruling she
made in August, when she found the agency`s failure to issue
documentation in a timely manner to be arbitrary and capricious, and in
violation of its non-discretionary duties.
She blamed the bureau`s \'Byzantine organizational structure and
antique computer systems.\'
\'You have a paper records-based system where an official cannot take
any action on a case unless the actual file is on his desk,\' Javier
Maldonado, one of the attorneys that won the injunction in a class
action lawsuit told United Press International.
As a result, legal residents were left in limbo -- unable to work
legally, or travel abroad sometimes for months or years -- while
officials attempted to marshal the necessary documentation.
Maldonado is executive director of the Texas Lawyers` Committee, a
non-profit that advocates for immigrants and refugees throughout the
state of Texas.
He said that most of the people on whose behalf the suit was filed had
been in deportation proceedings, which they had fought by successfully
gaining legal permanent resident status -- normally on the basis of
family ties or marriage to a U.S. citizen.
But he said officials at the Bureau of Citizenship and Immigration
Services often didn`t recognize the court`s ruling -- or could not
obtain the necessary documentation of it. \'The right hand doesn`t know
what the left hand is doing,\' he said.
According to court papers, the bureau has abandoned the pre-Sept. 11
practice of issuing temporary documentation -- like a passport stamp --
to legal permanent residents, citing the superior security of the new
biometrically-encoded, machine readable Green Card.
Bureau Spokesman Chris Bentley told UPI that the agency could not
comment on the matter, because it is considering whether to appeal, but
in court papers, it has said that national security considerations mean
officials should not have to meet any deadlines for issuing Green Cards.
Until the permanent resident`s file, paperwork from the court,
background check information and biometric data like fingerprints are
all in one place, officials have argued, it is not possible to ensure
the integrity of the system and guard against possible efforts by
terrorists and other malefactors to game the naturalization process.
The judge called these arguments \'illogical and unacceptably vague as
a legal justification for withholding documentation.\'
She also pointed out that the agency outsourced all its biometric data
collection, creating another crack into which documents could drop,
delaying the process further.
Janice Kephart, a counsel to the Sept. 11 commission who has testified
before Congress several times on national security and immigration
issues said the case highlighted the department`s failure to develop
the technology that the bureau needed.
The case was \'Ridiculous ... an embarrassment,\' she
said.<!--page-->
\'This has got to be the last time that (Citizenship and Immigration
Services) gets its knuckles rapped for not having an electronic records
system,\' she said.
Kephart, now a private sector security consultant who wrote a study
this year of the use of immigration benefits by terrorists, calls the
bureau staff reviewing applications for U.S. citizenship and residency
\'our last line of defense.\'
The administration \'has to get a grip on the (technology) issue,\' she
said.
Gonzalez faces a heavy in-tray at the bureau, which has come under fire
recently on Capitol Hill where conservatives have criticized it for
issuing Green Cards and other immigration benefits without conducting
sufficiently rigorous background checks -- more or less the opposite of
what the California court castigated it for last week.
He will also oversee the task of re-designing the naturalization test
-- the ticklish and politically sensitive task of deciding what those
who want to become Americans need to know before they can be granted
citizenship.
Tuesday`s statement from Homeland Security Secretary Michael Chertoff
said he was confident Gonzalez, confirmed Dec. 21, \'will be a valuable
asset and knowledgeable partner, leading (U.S. Citizenship and
Immigration Services) in exciting new programs to improve customer
service, enhance national security, and eliminate the immigration
caseload backlog.\'
Gonzalez, 48, is a Cuban-American, like his predecessor at the agency
who left in June to be ambassador to Spain, Eduardo Aguirre.
According to the Miami Herald, Gonzalez`s family left Cuba in 1961, the
year Fidel Castro proclaimed the \'socialist character\' of the
revolution there -- and the year Cuban exiles, trained and financed by
the CIA staged the disastrous and bungled invasion at the Bay of Pigs
on the island`s southern coast.
Gonzalez, four years old, left Cuba aboard a ship carrying Catholic
priests and nuns expelled by the Castro government, the paper reported.
He became a U.S. citizen five years later.
Gonzalez is a 26-year veteran of the military, whose career included
postings to the U.S. Embassies in El Salvador and Mexico, and
culminated as a special assistant to Gen. Peter Pace, then in charge of
U.S. Southern Command.
In 2002, he became director for Western Hemisphere affairs at the White
House`s National Security Council, but left in July 2003 to work for
Tew Cardenas, a big Washington law firm.
Supporters tout his military service national security credentials.
Critics have questioned his lack of any legal or immigration background.
========================
23. Casinos
leery of biometrics, new pay systems - BY VALERIE MILLER - Las
Vegas Business Review Press - Dec 27, 2005
Source
Next Contents
Don't expect to be using that contactless credit card on your next
visit to a Las Vegas casino. While 7-Elevens and McDonald's may let you
pay for Big Gulps and Big Macs by waving your cards, the gaming
industry isn't betting on its success just yet.
Some 3.5 million contactless cards are already in circulation but
casinos have been hesitant to tackle the swipe-less systems, even
though they have often embraced other computerized technologies.
Likewise, another high-tech form of identification -- using a
customer's fingerprint in lieu of a card -- is not likely to be
smudging the digits of high rollers anytime soon.
The gaming industry has been slow to adopt these new-fangled payment
systems for a number of reasons but start up costs head the list.
Initially, the traditional credit-card machines would have to be
swapped for the new readers. Another added expense for casinos would be
the need to replace their popular players' cards (Chase's Blink or
MasterCard PayPass are the industry contactless cards leaders), said
Joe McDonald, the chairman of the Gaming and Wagering Protection
Council for the Washington, D.C.-based American Society for Industrial
Security.
"To replace player rewards cards, you are probably talking about $5 per
card, and then you look at somebody walking through a casino who drops
20 cards on the floor. You have to replace their cards. And to change
out the reader, you are probably talking $75 per machine," said
McDonald, who is based in Las Vegas.
The innovative cards could be redundant if used for gamblers, he adds.
Important marketing information, such as demographics and amount of
play, are already tracked by resorts' rewards systems. The contactless
payment system involves the customer holding the card one to two inches
from the electronic reader, which detects the pertinent data and
transmits the credit-card transaction via radio frequency
identification.
The biometric identification/payment method requires customers to place
their index finger in an electronic reader, which can identify the
patron from unique points on the extremity. The users enter their phone
number or zip code and select the account to which the payment will be
debited, providing they're already in the data base.
Harrah's Entertainment has delved into fingerprint biometrics for some
back-office functions, including cash rooms, but like most of the
industry, has limited the technology to employee use. The gaming giant
does have the biometric Automated Cash Machine (ACM), which employs
facial recognition for check cashing, at its Rio All-Suites Hotel &
Casino and Las Vegas properties. After an initial facial scan using a
small screen on the ATM, patrons can cash checks using any Visage ACM
without the assistance of a cashier.
ATM owner Global Cash Access describes the machine as a "cash
dispensing virtual cashier," and its executive vice president of
domestic and international sales, Diran Kludjian, sees many pluses for
gaming use. "A lot of times, people max out their ATM limit at $250 or
$300, but the check limit is $500, and there are a lot of people who
are [still] check writers who don't want to use ATMs."
Despite reports to the contrary, Caesars Palace was not going to
implement fingerprint recognition in lieu of room keys at its new
tower, stated Tim Stanley, Harrah's Entertainment chief information
officer.
"We don't use it for consumers for two reasons. For one, (casino)
customers have a natural animosity to giving their fingerprint. In Las
Vegas, that doesn't play," he said. "The second issue is that most of
the stuff has several steps that you might have to go through to make
it work. It doesn't always work, and most of this fingerprinting stuff
has a Big Brother feel to it."
Image problems could impede the use of biometrics for casino patrons,
concurred Avivah Litan, an analyst for the Connecticut-based Gartner
Group. "The cons are that gambling tends to be an anonymous activity
and people might be reluctant to give their fingerprints," she said.
"Fingerprints are very invasive from a privacy point of view. I
wouldn't imagine that anything invasive would be a big selling point
for a casino."
"There are a lot of people who don't want to be known as checking into
hotels," McDonald said. "You know, 'What happens in Vegas, stays in
Vegas.'"
However, according to Curtis Arnold of CardRatings.com, a consumer
credit card information site, there could be an upside to contactless
technology. "Studies have shown that cardholders using the technology
spend more," he said.
While a secure transaction is an issue because it's done via radio
waves, Harrah's Stanley worries about the implications of using credit
card-equivalent cards for player rewards. "The chips in the cards are
costly and casino customers tend to lose things a lot," he said. "Right
now, if you lose a rewards card, the only thing somebody else can do is
add points to the card."
The Golden Nugget's vice president of marketing, Dan Shumny, speculates
that casinos may be slow to embrace the newest technology because they
are simply going through a technological overload as it is.
"My feeling is that casinos lag behind other industries when it comes
to technology. We have so many systems in place and we are trying to
make those work," he said. "You have to have educated people running
them."
=============================
24. Blown away by new
technology - By Selma Milovanovic - The Age [Australia] -
December
30, 2005
Source
Next Contents
Prison officer Graham Mauldon is checked by the new scanner at the
Melbourne Assessment Prison
Photo: Andrew de la Rue [Photos omitted]
HIGH-TECH scanners that detect tiny particles of drugs and explosives
are the new tool in fighting contraband in Victoria's maximum security
prisons.
The first of the $300,000 walk-in scanners — the most modern in
Australia — went into service yesterday at the Melbourne Assessment
Prison, checking visitors for 40 types of drugs and 40 explosive
substances.
Visitors entering the prison will be checked by the Ionscan Sentinel
II, which blows puffs of air over each body, releasing the residue of
any narcotics or explosives attached to the skin, hair or clothes. The
scanner takes eight seconds to analyse the particles. If any contraband
is found, the machine alerts authorities and snaps a digital photograph
of the person being scanned.
The scanner will also soon be introduced at the new remand prison in
Ravenhall and at the Barwon Prison.
"We find that people are finding more sophisticated ways of trying to
bring contraband into prisons," Corrections Minister Tim Holding said.
And, as the state's maximum security prisons now housed accused
terrorists and suspected gangland killers, a greater security level was
needed to ensure the safety of prisoners and their visitors.
New biometric iris scanning technology was also introduced at the
Melbourne Assessment Prison on Christmas Day.
Visitors' eyes are scanned as they enter and exit to ensure the people
leaving the prison are the same as those who come in.
The security upgrades come after the instances of white powder
substances entering prisons more than doubled in the last financial
year.
The most common items seized from prison visitors are cannabis, heroin,
speed, syringes and other drug paraphernalia. Weapons, drugs and items
such as a tattoo needle hidden in a bar of soap and a razor blade stuck
to a toothbrush were among some of the 1243 items seized last year.
Drugs were also found on children, concealed in women's hair or in the
tips of pointy shoes.
"Over the last five or six years our system has made massive inroads to
decrease the amount of drugs in our prison system but they still get
in, in small quantities," said Trevor Craig, general manager of
south-east region prisons. "Machines like this technology will
obviously decrease that even further."
The new machines follow security upgrades at the MAP and Barwon Prison
and the introduction of more X-ray and metal scanning equipment. Since
2002, prison officers have also doubled the number of searches
conducted on visitors.
==========================
25. 2006
i-Technology Predictions: SYS-CON's Annual Round-Up of
Techno-Prognostications - Software Development Activists, Evangelists,
Gurus, and Executives Speak Out - By Jeremy Geelan - SysCon
Technology - Dec 31, 2005
Source
Next Contents
According to SYS-CON Media's worldwide network of software development
activists, evangelists and executives - including the creator of Ruby
on Rails, David Heinemeier Hansson - 2006 promises to be a
vintage
year for software development...
Take Microsoft, for example: A new client OS is on the way, Microsoft
Vista, due late in 2006, giving rise to the obvious question: will the
new cool 3D user interface be enough to move user to upgrade? We’ll
see. Maybe the new built-in security, performance features, and
integrated search will be enough to convince users – after all, why go
to the Web if built-in web-enabled services and integrated information
search allow the Web to come to you?
Or consider the world of PDA Devices. Everyone is looking for the next
killer Palm or BlackBerry. But are they looking in the right
direction
for the next killer PDA? What about unexpected places – for example
Nintendo? Check out the new Nintendo DS: could you imagine it
running
Pocket PC or Palm OS? That would make a very cool gadget. And what
about iPod, have you seen the new iTunes-enabled Cingular Phone? It
could be closer than you think.
On the pages which follow you will find the collected wisdom of some of
the most acute prognosticators in the industry. As always with JDJ and
SYS-CON Media, we ask not pundits and sideline commentators but
activists, folks whose connection with software development and/or the
software industry is daily, intense, and driven by real-world concerns
of ROI and the business case for innovation, not just innovation for
innovation’s sake.
As ever, please don’t hesitate let us have your own thoughts. “None of
us is as smart as all of us,” they say, a philosophy that has even
spawned a book*. We will publish a round-up of Readers’ Predictions in
the February issue of Java Developer's Journal.
Let’s begin this year’s round-up with the predictions for 2006 of
Mitchell Kertzman, now at Hummer Winblad Venture Partners but still
famous for having been the founder and CEO of Powersoft, which merged
with Sybase in February 1995. When someone with over 30 years of
experience as a CEO of public and private software companies tips LAMP,
for example, it lends a certain credence to an already strong
trend
that we have sought to cover in SYS-CON Media’s various publications
such as LinuxWorld Magazine and over at OpenSourceEnterprise.com.
MITCHELL KERTZMAN: AJAX, LAMP, Virtualization, SaaS, Open Source
Since I’m in venture capital now, I try to put my (and others’) money
where my mouth is, so my predictions will tend to match up with my
portfolio.
In no particular order:
1. Rich application interfaces, including (but not exclusively) AJAX. Enterprise developers/IT managers have finally realized that the browser interface was a step backward to the 3270 and forms mode. That was good enough for a while, but not anymore.
2. LAMP in the enterprise. If you follow my portfolio company, ActiveGrid, you’ll find one of the leaders of the J2EE app server market now offering a far easier to build and less-expensive to deploy platform.
3. Virtualization. With three strong virtualization platforms (VMWare, Microsoft Virtual Server and XenSource) now available, there will be more and more software products built not on traditional hardware/software platforms, but on virtualized platforms. Check out Akimbi Systems, which provides a very exciting application for QA and test in the enterprise.
4. 2006 will be the year of acceptance of the importance of roles in the whole world of identity management and provisioning. Bridgestream is the leader in role management integrating with the leaders in identity management, directory services and provisioning.
5. The two trends that will not be new for 2006 but which will continue their growth are Software as a Service (SaaS) or on-demand software and Open Source, which continues to find acceptance in the enterprise.
1. The most important business applications will be hosted. Companies with more leg in the 21st than the 20th century will be running their most important applications online. The business won’t identify with Office or Windows, but with applications like Basecamp and GMail. It’ll become a legitimate question to ask why non-tech companies would bother running their own infrastructure.-----
2. AJAX becomes the rule, not the exception. Most new web-applications will launch with varying degrees of AJAX usage. Those that doesn’t will be berated for it and quickly scramble to do it by version 1.1. This will put more pressure on development environments to support AJAXdevelopment in their core. Those that doesn’t will lose mindshare.
3. Tags will shed cool, but gain prevalence. We will stop to notice the use of tagging by its presence and start being annoyed by its absence. All new collaboration, organization, and management tools will employ tags as a standard part of how things are done.
4. “Enterprise” follows “legacy” to the standard dictionary of insults favored by software creators and users. Enterprise software vendors’ costs will continue to rise while the quality of their software continues to drop. There will be a revolt by the people who use the software (they want simple, slim, easy-to-use tools) against the people who buy the software (they want a fat feature list that’s dressed to impress). This will cause Enterprise vendors to begin hemorrhaging customers to simpler, lower-cost solutions that do 80% of what their customers really need (the remaining 20% won’t justify the 10x -100x cost of the higher priced enterprise software “solutions”). By the end of 2006 it will be written that Enterprise means bulky, expensive, dated, and golf.
5. Ruby on Rails achieves world-wide mindshare domination. Ruby book sales jumps another 500%, half the new Web 2.0’ish companies launch using Rails, RailsConf sells 400 seats in record time, three major companies announce baked-in support or services for Rails, and all major vendors dealing with web-technology starts talking about how they will either work with Rails or put their own stack “on Rails.”
1. Data Storage – The proliferation of blogs, the raw size of XML documents (and everything is XML these days) are going to drive us to a new emphasis on storage (SANs in particular).
2. AJAX everywhere – IE gets new life out of the proliferation of AJAX. More high-profile sites are going to adopt AJAX as a means of extending the life of the browser in the near term. We may even see the return of some application-development tools around AJAX (something more than just component libraries).
3. Dashboard apps – Even with the proliferation of AJAX we are going to see a serious rise in client-specific apps that are based on Web 2.0 technologies – think iTunes.
4. Blogging acid-reflux – The massive interest in blogging continues to rise, but reliance and confidence in individual blogs sags – high-profile blogs that are industry-specific begin to dominate and provide a bit of “editing” to the process.
5. William Strunk Jr. rolls over in his grave – The illustrious author of The Elements of Style officially rolls over in his grave. I thought that basic writing skills were bad as seen in e-mail documents, but blogging takes things to a whole new level of poor grammar and punctuation.
6. Information Security - We start to get serious about protecting applications during the coding process – not just as an afterthought.
1. Several of us who have been saying for years that the Semantic Web has no commercial value will be proven wrong, although it still seems unlikely that technologies such as RDF and OWL-S will really do everything people think they will.
2. The distributed processing architecture for SOA infrastructure will gain adoption over the hub-and-spoke architecture, which is just too limiting and expensive compared to the more flexible and cost effective distributed approach.
3. The OASIS WS-Transactions specs will be completed during 2006 as stated in the WS-TX TC charter.
4. Customers will begin to push harder than ever for real software standards, in increasing recognition of the comparatively higher costs of doing business in a proprietary world.
5. The open source world will become recognized as a source of innovation, not just the commoditization of existing ideas. The open source world doesn’t suffer from the kind of organizational inertia that can inhibit innovation behind closed doors.
6. AJAX will become established as the solution for “browsers for SOA” but it will not solve the problem of how you access all the data still contained in legacy environments, which still need to be service enabled – with their mission critical qualities of service preserved.
1. Java has been in the dark for the last few years, its time to come back around again is here. Sun has some interesting initiatives in the pipeline.
2. The movie industry will wake up to BitTorrent (and the likes) and actually figure out a way to utilize this revolution instead of trying to close it down. You can’t push back the tide. The BBC is going to be launching BBC2 as the first broadband television channel in 2006.
3. Google shares fall or even crash. Everything that goes up has to come down and contrary to popular belief, they aren’t the biggest player on the Internet and people will start distrusting them as Microsoft and Yahoo! crank up their offerings.
4. In fear of Microsoft Vista (and AJAX), Adobe will offer all Flash development tools for free which will result in a major surge in adoption.
5. IE7 will probably more than likely eclipse FireFox again.
1. A consortium will identify and strongly promote a subset of the WS-* stack, leading to an acceleration in the growth of SOA. Meantime there will be a significant increase in deployment of purely REST-based services. HTTP will be sexy again.
2. IBM, Sun and Oracle will announce a joint identity management initiative, with Google’s single sign-on being the leading competitor.
3. The rebranding of the Semantic Web as “Semantic Technologies” and “Web of Data” will enable previously dismissive pundits to hype it as the Next Big Thing. There will be real growth in these areas, but not as yet meteoric. Yahoo! will reveal its answer to Google Base, built using Semantic Web technologies. Nokia will join VoIP to the Semantic Web.
4. Mobile devices will become still more sophisticated and more ubiquitous. There will be a growth in “base station” software and smarter notification and synchronization between the desktop/LAN and mobile device. Apple will explode onto the mobile phone market with their iComm, which will include a new user interface paradigm and make Star Trek noises.
5. Support for RSS in Microsoft Vista and Internet Explorer 7 will be indistinguishable from Windows 95’s Active Channels following the company’s removal of new features due to security concerns. There will be massive growth in enterprise-oriented knowledge management systems based on RSS and Atom. There will be a new generation of RSS/Atom aggregators exploiting data published using XHTML microformats and Structured Blogging.
6. Traditional search engines will increasingly be augmented with metadata-based directed query capabilities, initially driven by keyword tagging, but increasingly with reference to “Semantic Technologies.” Social networks will become a factor.
7. A new market in commodity packages combining data storage and protocol support will begin to appear. These packages will allow plug-in scalability and cross-system synchronization, with implementations being built variously on Grid architectures, Atom Stores, general XML stores and RDF triplestores. Google will release a boxed Data Appliance Solution, with replication on their own servers.
8. Service mash-ups will become increasingly sophisticated, with microcompanies able to compete head-on with the big companies’ portals.
9. While advertising will become more sophisticated in its targeting, user attention tracking will lead to other revenue sources becoming more attractive, and the feedback loop from online opinions to product development in the real world will begin to close. Market research will begin to counterbalance search engine optimization as the road to fortunes.
10. A clear divide will appear between companies which approach the Web in a participatory fashion and those which produce 21st century networked version of the shrink-wrap product. The continuing growth of open source will drive the companies in the latter group to attempt increasingly desperate measures to counter the decline in their revenue. More ridiculous patents will be granted, existing ones will be stretched to the limit in courts. Lawyers will make lots of money.
1. Private mail networks: With people getting slammed I believe we will see the rise of VPMN (Virtual Private Mail Networks). Essentially, these are analogous to VPNs, allowing private network traffic run over the public backbone. They use common SMTP protocols to deliver mail, but unless you have permission to send mail to the recipient the mail will be rejected.
2. AJAX: We will see the rise of even stronger support for more powerful portable client-based applications based on Web protocols.
3. Composite Applications: With the rise of SOA and BPM, it’s going to get even easier to develop applications that require less low-level coding skills and which are more flexible and can respond faster to changes in business.
4. VoIP Phones: Advancements and growth in high bandwidth wireless networking means that wireless devices will be IP addressable, which means that the next wave of phones will leverage the public Internet for phone communications and common WAN/LAN. Windows CE and Palm devices will be able to provide voice services. Gone are the days of buying a phone dedicated to a single network provider.
5. Self-publishing: Garth Brooks & Wal-Mart, LuLu, MusikMafia. These names all represent a rise in successful self-publishing. Book, magazines, music are all media that are being self-published over the Internet. Soon, this will be expanding to software as Software as a Service (SaaS) becomes more popular.
6. Metadata: Metadata is finally being recognized as a critical enterprise asset. It’s now being managed properly and leveraged for its properties for automation.
7. Semantic Technologies: People and organizations are finally starting see the value in being able to describe data in context and defining the relationships between data. Semantic technologies enhance and extend the basic power realized by relational database technologies to data anywhere in the world.
1. Enterprises will finally start using Java 5. The sooner 5.1 version is released the better.
2. AJAX hype will calm down. AJAX is an interesting technology, and will become one of many techniques used in Web applications development. Nothing more.
3. Fat clients will be more widely used in distributed enterprise applications. Java still has a chance to be used in this area, if someone will create an IDE with an easy to use and powerful Swing GUI designer. JDeveloper and NetBeans are leading here. Adobe (formerly Macromedia) tools will become more and more popular.
4. Smart development managers will start creating mixed open-source/commercial environments. For example, you can use open source J2EE servers in Dev and QA and their commercial counterparts in Prod and Contingency environment. The same is applicable to DBMS, messaging et al. Some open source vendors are already moving in this direction by creating products that are 100% compatible with particular commercial tools.
5. A new software architecture for small and mid-size businesses should arise. IMHO a good candidate is what I call "Client-Server Message Bus" (CSMB). A set of client server applications can talk to each other using open source messaging and an enterprise service bus. Note: client-server applications can have more than two tiers, i.e. RMI client, RMI Server and DBMS.
6. Programming will become the trade of the younger generation. Middle-age programmers will be leaving the coding arena and moving to business analysis and management. You can't beat a 25-year-old Indian programmer who's ready to join any project tomorrow (in any place on Earth) sharing a room in so called guest apartment. The code quality of such a programmer may not be as good as was expected by the employer, but this will be a little secret for some time, and smart kids will have enough time to learn how to program on the job.
7. A number of CIOs will come out of the closet and publicly admit that the real cost of outsourced projects is high, because for every two young Indian programmers you need a local business analyst who will write super-detailed functional specifications and validate their work. But outsourcing is here to stay (at least in the USA) and not because overseas programmers charge less, but because just finding local programmers will become a difficult task.
8. Yahoo! will come up with some new innovative Web products that will be able to compete with Google's software. If not Yahoo!, who else?
9. By the end of the year the broadband Internet will give DSL and cable Internet a run for its money. The wireless companies just need to cut the prices of their broadband service, and the masses will start leaving their "traditional" ISPs.
10. Java use will steadily increase despite the fact that various replacements are being offered. Java is more than an excellent object-oriented language enriched by tons of productivity libraries (networking, multi-threading, security et al). It's a mature and proven platform for development of all kinds of applications for all kinds of hardware. Java in programming plays the same role as English in the real world: no one says that Italian language will replace English any time soon; on the other hand, songs in Italian sound great.
1) E-mail will be re-engineered to stop spam and phishing, so it will help legitimate businesses better utilize the channel for secure communications such as statements, purchase orders, customer service, etc.
2) As part of the email re-engineering effort every sender will have to implement the authentication standards. Unfortunately, there will still be various authentication standards.
3) AJAX will be adopted like wildfire.
4) As PHP becomes more widely adopted as a highly productive, quick and dirty language, more and more people will realize that for serious enterprise grade, industrial strength applications they will have to use Java and JEE.
5) Service Oriented Architecture will continue its very slow and quite advance in the enterprise. A few years from now everything will be SOA and we will not remember how it happened.
1. Ruby (on Rails) and the such will still be touted as taking over Java, but in reality will be as insignificant as they are today.
2. Web 2.0 will solidify its status as a powerful buzzword. A lot of fluff, very little stuff.
3. Sun will once again dangle the open-source carrot as Mustang get closer to its release date.
4. The IE 7 rate of adoption will be phenomenal, especially compared to Firefox.
5. 60% of Google's services will still be in "beta".
6. Yahoo! will be the first Internet portal to come up with a compelling set of mobile-based services.
7. No spam salvation. Many will try, all will fail.
8. VoIP and Wi-Fi will become even more so synonymous.
1. Security will continue to be a hot topic and will rise in the priority list of executive (finally) due to the public failures of some big names (still TBD).
2. Rootkits are already all the rage with the bad guys, 2006 will see the arrival of tools to combat them at the consumer level as spyware and anti-virus packages continue to awaken to this threat.
3 .NET 2.0 will help developers write more secure code then ever before, but we will continue to be our own worst enemy by subverting good systems with bad practices.
4. Brute force attacks will become more prolific and password security will take center stage once the code is deemed "secure enough."
5. We will likely see the first public case of terrorists using hacking to bring down a public utility (whether it is the Internet or the power grid) . "I went out on a limb with that last one," Hynds added, "as it hasn't happened yet (successfully) though I thought it was a good bet back in 2002. Security is a war, don't fight fair. You can be assured that the script kiddies, organized criminals and terrorists won't."
Mention
the word criminal forensics and immediately most people think about
Marg Helgenberger or David Caruso from CBS television’s popular series
“CSI” and “CSI: Miami.” You know — glitz, glamour, special Hummers, and
unraveling the clues to crack the case all in one hour every week.
What they don’t realize is that in reality it’s just not that way. Not
even close.
West
Virginia University’s internationally renowned Forensic and
Investigative Science academic program has set up a learning lab in
Atlanta’s Marriott Marquis ballroom so those attending Sugar Bowl
activities this week can get a real feel for what crime scene
investigation is all about.
Woodrow Wilson High School graduate
and WVU senior Patricia Elswick is part of the forensics team on hand
for the event. She says what the CSI television show portrays is
actually pretty misleading when it comes to investigating crime scenes.
“It’s
not all they make it out to be on TV sometimes,” Elswick said. “They
don’t actually show all the grunt work that’s involved.”
Elswick, the daughter of Norman and Thu Elswick of Pax, said she
actually developed her interest in forensics from her father.
“My dad would watch shows like ‘Poirot,’ ‘Sherlock Holmes,’ ‘Murder She
Wrote,’ and I got interested from there,” she stated.
Pursuing
a double major in biology and forensic and investigative science, she
said the main reason she chose WVU was due to the quality of the
instructors in the forensics program.
“They’ve done it before, they have extensive experience in the field,
and they give you a really good idea of what to expect.”
Marlene
Shaposky, a senior forensics major from Summersville, says the free
trip to Atlanta for New Year’s and the Sugar Bowl is nice, but there is
a price.
“It’s great, but we’re working for it,” Shaposky
stated. She says upon graduation she is aiming to get a job in the
criminal examiner’s track or going on to war school.
The
learning lab display, which will be open today and Monday, is an
opportunity for WVU supporters to check out the various techniques used
to help solve crimes — while also providing those visiting a chance to
explore one of the university’s fastest growing majors.
“There
are well over 1,000 students in the different disciplines relating to
forensic science and national security,” said Max Houck, director of
the Forensic Science Initiative and Research Office at WVU.
Among
the fields of study available are biometrics, forensic accounting,
computer forensics, criminology and investigations, and a new
concentration in intelligence and national security. Specialization is
also offered in forensic chemistry, forensic biology or crime scene and
fingerprint analysis.
West Virginia University is one of nine
forensic science programs across the country to be accredited by the
Forensic Science Education Program Accreditation Commission.
So
what can fans expect? Well, Houck says they plan to have some fun by
doing chalk outlines, lifting fingerprints from a football and football
helmet, and passing out “IdentiKit” packets to allow parents the chance
to record their children’s identifying characteristics.
Becky
Lofstead, director of news and information services at WVU, said the
forensics program is so well known that CNN will be sending a crew to
do a feature on the learning lab on Monday.
============================
The name, date of birth, height, weight, even the physical scars and fingerprint patterns all matched a man wanted for numerous counts of criminal sexual penetration of a minor in Doña Ana County.
But in the end, the Border Patrol had to release him. The man detained wasn't the suspect after all.
A news release from the Border Patrol issued Dec. 29 stated that Fidel Venzor-Melendez, 46, was detained at the Presidio, Texas, border crossing. Venzor-Melendez had entered the U.S. in a taxi.
A database check revealed Venzor-Melendez was wanted in Doña Ana County on 14 counts of criminal sexual penetration of a child under age 13, and one count of criminal sexual penetration of a minor.
The suspect was turned over to the Presidio police department and jailed. He was residing in Joshua, Texas, at the time of his arrest.
However, the Doña Ana County Sheriff's Office instructed officials in Presidio to release the man Thursday evening, as he was not the same Fidel Venzor-Melendez being sought on the various charges.
Roger Maier, public affairs officer with the Border Patrol's El Paso office, said the man was released when his photo was compared with one the Doña Ana sheriff's office had of the actual suspect.
He said cases of mistaken identity based on so many similar characteristics are "exceedingly rare."
Maier
said neither the Border Patrol or the sheriff's office could explain
how that happened. "I don't know how that could be explained by
anyone," he said.
=====================
43. A year later,
RCMP helping Thais identify victims of tsunami - Brandon
Sun [Canada} - Jan 1, 2006
Source
Next Contents
=======================
ISTANBUL, Turkey - An alleged al-Qaida operative accused of serving as a key link between the group's leaders and suicide bombers hid his tracks so well that even fellow militants thought he was dead.
Loa'i Mohammad Haj Bakr al-Saqa, wanted by Turkey for 2003 bombings in Istanbul that killed 58 people, is said to have eluded intelligence services by using an array of fake IDs, employing aliases even with his al-Qaida contacts and finally faking his death in Fallujah, Iraq, in late 2004.
The Syrian radical didn't surface until last August, when an accidental explosion forced him to flee his safehouse in the Turkish resort of Antalya, police say. Officers reported finding bomb-making materials meant for an attack on an Israeli cruise ship as well as fake IDs and passports from several countries.
Police eventually cornered al-Saqa in southeastern Turkey and he is awaiting trial on terrorism charges.
His story is an example of how al-Qaida militants operate in the shadows, changing identities, moving from country to country and covering their tracks to help the loosely organized terror network carry out attacks.
Until recent years, al-Saqa was not well-known to international intelligence agencies despite his conviction in absentia in 2002 - along with al-Qaida in Iraq leader Abu Musab al-Zarqawi - for a failed plot to attack Americans and Israelis in Jordan with poison gas during millennium celebrations. He and al-Zarqawi were each sentenced to 15 years in prison.
Al-Saqa later emerged as a key al-Qaida operative in the Middle East. Two Turkish terror suspects interrogated at Abu Ghraib prison in Iraq said al-Saqa served as a connection between the 2003 Istanbul bombers and al-Qaida, according to testimony obtained by The Associated Press.
"He is a very important person for that region because obviously he knows more people than the locals themselves," said Michael Radu, a terrorism analyst at the Foreign Policy Research Institute in Philadelphia. "He probably meets people from different cells, different subgroups who do not know each other, but he knows them so he can have a much better picture."
Al-Saqa, 32, juggled identities, and rumors, to elude intelligence agencies.
Turkish al-Qaida suspect Burhan Kus said at Abu Ghraib that he had heard al-Saqa and Habib Akdas, the accused ringleader of the Istanbul bombers, were killed in a U.S. bombardment of the Iraqi town of Fallujah in November 2004.
"Al-Saqa apparently faked his own death, borrowing a disinformation tactic used by Chechen militants," said Ercan Citlioglu, a terrorism expert at the Center for Eurasian Strategic Studies in Ankara, the Turkish capital.
Several accused Turkish al-Qaida suspects recognized al-Saqa's photos but identified him with different names, most calling him "Syrian Alaaddin."
"The al-Saqa case clearly shows how al-Qaida is taking advantage of fake IDs and porous borders to spread its terror, forcing countries to take more sophisticated measures, like taking fingerprints in the United States, to increase border security," Citlioglu said.
Analysts said his capture was a blow to al-Qaida since he would be one of only a few people who understood the infrastructure of an organization that lacks permanent, hierarchical links.
"That is a serious blow because it is very hard to replace these kind of people," said Radu.
But Turkish security officials warn that others still operate in the region. One official, who spoke on condition of anonymity, described al-Saqa as one of fewer than a dozen al-Qaida "middle managers" who serve as contacts between local cells and the al-Qaida leadership.
Al-Saqa's success in eluding capture for so long underlines the challenges that authorities face in trying to crack down on al-Qaida and the insurgency in Iraq.
He apparently left Iraq after spreading the rumor about his death in Fallujah. Nine months later, police responding to the Antalya explosion discovered more than 1,320 pounds of bomb-making materials, falsified Syrian and Turkish IDs and two Tunisian passports.
All bore al-Saqa's picture. He eventually was captured at Diyarbakir airport in southeastern Turkey with yet another fake Turkish ID.
Only then did Turkish police realize they had captured and deported al-Saqa - without knowing his real identity - in March 2003 for carrying a fake Syrian passport.
Identifying himself as a "mujahed" - guerrilla fighter - al-Saqa admitted to failed plans to make a bomb and to stage an attack on Israeli tourist ships, similar to the attack on the destroyer USS Cole off Yemen in October 2000 that killed 17 sailors, said Emin Demirel, a terrorism expert and author of several books on al-Qaida's structure in Turkey.
According to testimony obtained by AP, al-Saqa told Turkish prosecutors: "I was going to blow up the Israeli ship in international waters."
Prosecutors charged al-Saqa with being a senior al-Qaida member, making bombs and smuggling explosives into Turkey. He is being held at the high-security Kandira prison near Istanbul. No trial date has been set.
Al-Saqa could also be extradited to Jordan, where a military court convicted him, al-Zarqawi and Jordanian-American Raed Hijazi in connection with the failed millennium terror attack. Jordanian prosecutors suggested in their indictment that al-Saqa was an agent coordinating between militants traveling through Turkey to Pakistan and Afghanistan.
In Istanbul, Al-Saqa played host to Hijazi and two other militants, including a cousin of al-Zarqawi, helping to arrange their travel to Pakistan for training in neighboring Afghanistan, court documents said.
Kus, the terror suspect held at Abu Ghraib, said al-Saqa was known to have provided passports to insurgents in Istanbul. He said al-Saqa brought $50,000 to Istanbul for the 2003 bombings at the British consulate, the local headquarters of the London-based bank HSBC and two synagogues. A total of 58 people were killed and hundreds suffered wounds.
Kus said al-Saqa and fellow ringleader Akdas cheered and shouted "Allahu Akbar" - Arabic for "God is great" - as they watched TV news in Syria about the bombings.
Seventy-two suspects were eventually charged in the attacks. The next hearing in that case is scheduled for Jan. 24.
Kus, charged with helping to build the Istanbul truck bombs, said he
later traveled from Syria with Akdas to Iraq, where al-Saqa was a
commander in Fallujah, then an insurgent stronghold west of Baghdad.
---
=========================
Everything about the new FBI regional computer forensics laboratory in Hamilton Township screams the word "geek."
The carpeting is emblazoned with maroon 0's and 1's -- the binary digits to which all computer codes can be reduced. A bookshelf in the main laboratory area features books about Unix, Windows XP and Quickbooks. And there are the 21 workstations, each crammed with computers, diskettes and other gizmos.
This is the new age of solving crimes: bits and bytes.
As technology has touched nearly all corners of society, crime has followed with it. Details about prostitution rings, drug deals, terroristic threats, pyramid schemes and missing persons cases can be stored in everything from a PDA to a cell phone -- and it is up to the cops to go into cyberspace to find them.
In 2004, the FBI opened the New Jersey Regional Computer Forensics Laboratory dedicated solely to extracting evidence from computers, cell phones, iPods, PDAs and even video game consoles. It is the first on the East Coast and one of eight in the country.
"One of the biggest challenges in digital technology is that none of us can be experts in everything," said Larry Depew, 49, director of the New Jersey Computer Forensics Laboratory.
Before the laboratory opened, the FBI's computer forensics lab was confined to one room in another FBI building in Franklin Township. They had three computers and an 18-month backlog of cases.
In 2004, state Attorney General Peter Harvey offered federal authorities 17,000 square feet of space in the state's Technology Complex in Hamilton. The lab today has 143 computers and 21 forensic examiners from eight police agencies in the state.
The laboratory is wrapped in tight security, with bulletproof windows and doors and cameras posted in corners. Flat-screen security monitors are perched throughout the laboratory, with a split screen showing different rooms in the building. If a visitor is on the premises, a blue light will flash throughout the lab, warning technicians to work discreetly.
The evidence, everything from laptops, cell phones, PDAs, iPods,
GPS systems, is stored in pink, plastic heat-sealed, anti-static bags
to preserve whatever data is on the gadgets. The rules of computer
forensic evidence are not much different from traditional forensics:
recognize, preserve, acquire, analyze. But instead of working with
fingerprints, or DNA, these technicians are staring into the vacuum of
cyberspace, trying to string together a person's computer usage based
on their Internet files and other trace elements.
"Digital evidence is just a piece of the puzzle," said Depew, 49, a former field agent, who has a white lab coat with the word "Geek" hanging in his office. "There's no one single smoking gun in most computer cases. It's a series of analyses."
Those searches, however are much more exhausting because of technology itself. Crimes are more complex, aided by sophisticated software that can encrypt information or disguise e-mail addresses. And the search field has widened on hard drives. Today's computers can store as much as 250 gigabytes of information compared with 4 to 10 gigabytes about a decade ago. One gigabyte can hold about 1,000 novels.
The number of cases also has increased.
So far this year, the lab has handled 491 cases from New Jersey, eastern Pennsylvania and New York. In 2004, the lab handled 340 cases.
One of the crimes this lab was called to work on was an espionage case involving Vice President Dick Cheney's office. Technicians analyzed the Internet activity of Leandro Aragoncillo, a former FBI analyst arrested in October and accused of downloading more than 150 classified documents from FBI computer systems at the Fort Monmouth Information Technology Center.
Depew would not comment directly on that case, but said generally technicians look at the documents used, the Internet use and the browser cookies to piece together a log of a suspect's computer use.
And about a year ago, when a Burlington County woman disappeared, the local police brought her laptop to the computer forensics lab to search for clues.
Within an hour, based upon her Internet searches, forensics experts concluded the woman had not been abducted, but was suicidal. They were able to track her down, but by the time they found her, she had already killed herself.
Elsewhere, forensic experts at the FBI's Kansas City lab were able to trace a computer diskette to Dennis Rader, the notorious BTK killer who terrorized Kansas residents for decades. They also played a role in the capture of Lisa Montgomery, a Kansas woman accused of killing Bobbie Jo Stinnett and cutting Stinnett's baby out of her womb. Authorities in that case found e-mail correspondence between the two, leading to Montgomery's arrest.
The lab, however, isn't just about finding evidence. It also serves as a training ground for cops and must also keep up with the latest and newest gadgets.
"It used to be that bad guys were always a step ahead and depending on the nature of the technology, that may still be true to some degree," said Chris Malinowksi, the retired director of the computer crimes unit for the New York Police Department. "But you may find some units out there, where once a new technology comes out, they will beef up that technology."
In fact, Depew said the laboratory bought an XBox 360 recently because they realized data could be stored on that system and wanted to acquaint themselves with the console for a potential case.
"The imagination of the industry and the rapid advance of digital
data is the challenge in this field," Depew said. "We have a group of
people who are dedicated to getting the job done."
===================
46.
Israeli consortium lays the groundwork for genetic 'credit card' - By David Brinn - Israel21c.org -
January 01, 2006
Source
Next
Contents
Imagine this scenario: a patient goes to visit his family doctor
complaining of allergy systems. He takes his gene card out of his
wallet and hands it to the physician, who swipes it through a runner
connected to his computer. Immediately, all of the data about the
patient's genome - his genetic makeup - appears on the screen, and from
that information, the doctor is able to prescribe the appropriate
medication that will be most effective without causing any side
effects.
A futuristic pipe dream? Not according to Professor Ariel
Miller of the Technion's Rappaport Faculty of Medicine and head of the
Multiple Sclerosis and Brain Research Center at the Carmel Medical
Center in Haifa, Israel. Miller is leading an ambitious consortium
involving scientists and engineers from five Technion faculties, which
is attempting to locate genes that will enable tailoring drug therapy
to each patient individually. This could solve one of the most
difficult problems currently facing physicians: which drug to prescribe
to a patient and in what dosage.
"The current mode of most medical treatment is based on trial and
error," Miller told ISRAEL21c. "Let's say a patient comes to a doctor
and is diagnosed with hypertension. The physician prescribes a
medication - but it's basically a gamble as to whether that med is the
best one for the patient. Then over the next few months, you see how
the patient responds. If there's not sufficient results, you might
increase the dosage, and if there are side effects, you might switch
the medication.
"So, the possible end result is that for a few months, the
patient might suffer from side effects from a medication which is
insufficient in the first place."
The Technion gene project will solve that problem by
pinpointing individualized medicine tailored to the patient in
accordance with his genome. According to Miller, it will enable the
attending physician to predict reaction to the drug treatment and will
replace the 'trial and error' medical treatment used today.
"If a patient has a certain genome, he'll react to
medication differently than a person with another genome," he
succinctly explained.
Five faculties and ten scientists - from Medicine,
Industrial Engineering and Management, Bio-Technology and Food
Engineering, Bio-Medical Engineering and Computer Science - have joined
together for project, including Technion faculty and physicians from
Rambam, Carmel and Haemek Medical Centers, together with their
assistants.
"The computer scientists among us will develop methods to
analyze the genetic data and genomes that will be provided to them by
the physicians and scientists," explained Professor Ron Pinter, of the
Technion's Faculty of Computer Science, and an expert in
bio-information who is coordinating the project with Miller.
"Ultimately, we hope to create the guidelines that will enable
physicians to more effectively administer medication. The bottom line
is that we'll be able to provide the tools that will be able to tell
which medication that's available on the market will be the most
effective for a given patient," he told ISRAEL21c.
The project is being sponsored by the Wolfson Foundation of
Great Britain and the Galil Center at the Technion, and was launched
following the initial success of research that Miller and his team have
conducted over the last four years related to pharmacogenetics - the
science of tailoring medications according to an individual's genome.
"Around four years ago, coinciding with the work on the
Human Genome Project [the 13-year effort to identify more than 20,000
genes in the human DNA lineup], we decided to deal with the issue of
how it can be used to physically change the way patients are treated,"
said Miller.
A team of neurologists and scientists from the Technion -
in collaboration with the Israeli Ministry of Industry and Trade and
with the pharmaceutical company Teva - tried to answer a relatively
simple question related to Teva's groundbreaking drug for multiple
sclerosis - Copaxone.
"The Multiple Sclerosis and Brain Research Center at the
Carmel Medical Center were very involved in testing Copaxone, the
world's leading drug for treatment of MS - we were the first to
discover how Copaxone worked in humans," said Miller.
The question they attempted to answer was - when you have a
new MS patient, how do you decide whether to give them Copaxone or
something different?
"For every treatment, patients are categorized as 'good
responders', 'poor responders' and 'adverse responders'. We genotyped -
or analyzed - hundreds of patients who have received Copaxone over the
years, then compared their genetics. We looked for things like if there
was a common denominator among all good responders, and likewise with
the other responders," Miller said.
"We've received positive preliminary results. We fished out
a number of genes that possess crucial 'SNPs' ['single nucleotide
polymorphisms' - which are DNA sequence variations that occur when a
single nucleotide in the genome sequence is altered.] These genes
define whether a patient will respond to a medication or not. Now we
need a bigger, more advanced study which is why we've launched this
expanded group under the headline 'Personalized Medicine,'" added
Miller.
Lack of information as to what drug is suitable for which
patient and what dosage is needed, harms patients and creates
unnecessary expenses arising from hospitalization as a result of drug
reactions and even disability caused to patients, according to Miller.
"Going back to the hypertension example, if you misdiagnose
for many months, it could result in the patient having a stroke, or
myocardial infarction. This project will help prevent side effects, the
resultant hospitalization, and will avoid giving medication which
doesn't fit. It will have a major economic impact, by lowering hospital
stays and money spent on ineffective medication. We're talking about
millions of dollars," said Miller.
Among the issues that the consortium will be investigating
besides the continued MS research are - treatments for psoriasis - does
a patient respond better to UV or to sunlight? And antibiotics - why
certain people who get certain antibiotics suffer hearing loss. And,
according to Miller, the issue of personalized medicine is not just for
medication, but also for lifestyle.
"For example, we may map the genome for the kind of person who is prone
to get a headache after drinking a glass of red wine."
With five faculties and many researchers involved in the
project, Miller and Pinter are optimistic that the varied skills and
interests of the team will work together in harmony.
"Part of the problems are already behind us - we've agreed on a
common agenda," said Pinter, who has a masters and PhD from MIT and has
worked for 20 years in industrial research and computation biology.
"We've developed a good rapport among ourselves and have developed a
common language. We're enlisting our own toolboxes, skills and
techniques to benefit whatever we know in the specific context of a
problem.
"We've already taken the first steps by organizing four research
teams to work together on specific issues. The first team to actually
meet is looking at the issue of data integration - how to organize
multitudes of data types, and how to get the most amount of information
available. This will help us learn where we need to conduct more
research and experiments," Pinter said.
According to Miller and Pinter, the gene project highlights
the unique ability of the Technion to integrate engineering, scientific
and medical capabilities, one that is not surpassed in the world.
"I think we're among the world's leading teams in the field,
and we've just received grants from the Wolfson Trust for the
purchasing of cutting edge technology for genotyping, which will allow
us to do a number of things we hadn't been able to," said Miller. "We
have a unique environment at the Technion - a combination of top
scientists, physicians and engineers. When I go to speak abroad, I say
it's like putting together Harvard and MIT," he said.
Added Pinter, "the Technion is unique in that it's a technical
university with a medical school. There's very few in the world. Here
you have people with skills in engineering, math and computer sciences
working side by side with researchers in medical science and with
practicing physicians."
In the future, Miller hope the project will lead to the development
of new drugs according to the patient's genome. But in the much more
immediate future, there's the gene card.
"The vision that the patients will come to the family
physician with a disk on key - a 'Health Key,' or maybe it will be like
a credit card. All the information of their genome will show on the
computer, and the physician will be able to match it to the right
medication.
"This is not so far off in the future. In some diseases,
it's already applicable. The FDA announced two years ago that only
women with a certain genetic makeup would benefit from a certain
medication for breast cancer. So now every woman with breast cancer who
is recommended to take this medication is going through genetic
studies."
While coordinating the various faculties and individuals
involved in the consortium is a daunting task, Miller is accepting it
with good spirits, and a bulldog determination that focuses on the goal
line. "In the future such a personal health card can save human lives."
====================
47. Zero tolerance
urged on foreign criminals - By Philip
Johnston - The Telegraph (UK) - Jan 2, 2006
Source
Next
Contents
Serious criminal behaviour by foreign nationals should be met with zero tolerance, a report says today. It calls for a presumption that deportation will be recommended for any offence that brings a 12-month jail sentence.
One in eight prisoners - about 10,000 - is a foreign national and the increase in overseas inmates has taken up 3,500 more spaces in the past five years than had been expected.
Every year the courts recommend deportation in only about 600 cases but no statistics are kept to show whether these are actually carried out.
The study by the UK think-tank Migrationwatch suggests that the arrangements are haphazard and that the guidelines to the courts, unrevised for 25 years despite the big rise in foreign inmates, are unclear.
The Home Office says that any foreign national sent to prison, with the exception of certain Commonwealth and Irish nationals, is liable to deportation.
The Home Secretary can make such an order after a recommendation by a court or on his own initiative on the grounds that the offender's presence is not conducive to the public good. But no one knows how many are removed.
A few years ago the Government introduced a scheme under which foreign national prisoners serving sentences of more than three months were to leave jail up to four and a half months early, bringing them into line with the home detention curfew for domestic prisoners.
Paul Goggins, the Home Office minister, said at the time: "There are many foreign nationals in prisons, some of whom will be suitable to deport before the end of their sentence.
On removal from prison they will be deported immediately to their country of origin. This will have a positive impact on the prison population as well as making a saving to the taxpayer."
The Home Office said that 1,500 prisoners had been removed under the scheme in the past year, although its parliamentary answers admit that deportation figures are not kept.
Migrationwatch says the system is unfair to those who are deported because proceedings usually begin only towards the end of the sentence.
As there are opportunities for appeal, the inmate can be kept in custody long after the term handed down while legal arguments continue.
The report calls for central records to be kept, including biometric information that should be available to posts that issue visas overseas to prevent offenders applying under a false identity.
The Sentencing Advisory Council is drawing up guidelines to the courts on how and when deportation should be recommended.
In a consultation paper last year it also criticised the lack of official figures. The last statistics it could find dated from 1996, when 360 court recommendations were made and 270 carried out.
Migrationwatch says: "At present, it is not possible to make deportation part of the sentence. The law should be changed to permit this to reduce the amount of time spent by foreign prisoners in Britain's heavily overcrowded jails."
"There should also be a presumption that
deportation should be recommended for certain offences, including
drugs, people smuggling, forgery of travel documents, serious offences
of violence and sexual offences."
=====================
Companies have made big investments in security, and even though keeping security current isn't as exciting as, say, investing in technologies that generate revenue, it still ranks among businesses' top priorities.
In the coming year, businesses and software vendors won't expect any reprieve from ever-inventive malware and hackers. InformationWeek Research's Outlook/Priorities 1Q 2006 survey of 300 business-technology professionals ranks updating security tools, policies, and procedures as the third most-important priority for businesses in early 2006. It's a priority beaten only by efforts to simplify or optimize business processes and cut IT costs, and ranked higher than boosting worker productivity and improving customer service.
Still, only 62% of respondents flagged security as a top priority.
That's the lowest percentage in InformationWeek
Research's past six priority studies. It was rated a top priority among
82% of respondents at this time last year, and received an all-time
high respondent rate of 91% in the 2Q 2004 study.
One reason may be that some businesses have just completed major security updates. Another reason might be that more businesses are making security a strategy of their software and system development from the onset, rather than adding on security technologies after software or systems are deployed. "There's a shift in spending from add-on threat prevention to building in security from the ground up," says Paul Stamp, an analyst at Forrester Research.
Vendors Sign on
It's an approach software vendors are taking, too. While regular patch
downloads from Microsoft, Oracle, and others have become the norm, in
the coming year, look for vendors to redouble their efforts to get
things right the first time.
Late last month, Oracle said it planned to start using Fortify Software Inc.'s Source Code Analysis tool to look for potential vulnerabilities in software being developed, including its application server, collaboration suite, database server, and identity-management software. "Patches are expensive for us to issue and for customers to apply," Oracle chief security officer Mary Ann Davidson says. "What you want to do is avoid this in the long run."
Oracle chose Fortify because other products couldn't analyze a code base the size of Oracle's, Davidson says. Oracle's technology stack consists of more than 30 million lines of code and is constantly changing as the company develops new versions of software.
Fortify's software also proved more accurate than other code-analysis tools Oracle tested. "False positives have been the bane of my existence," Davidson says. "A high false-positive rate makes the security problem worse. You have programmers chasing their tails."
Code-analysis tools aren't new, but they're doing new types of things. Earlier incarnations were primarily designed to test programs to make sure that areas of code executed according to plan, so that users got the experience that vendors promised. New technologies such as Fortify's, as well as Agitar Software's Agitator, Parasoft's JTest and C++Test, and Watchfire's AppScan, are tuned to address security holes during the application-development and testing phases. "Instead of looking at what the code should be doing, we look at what the code should not be doing," Fortify CEO John Jack says.
Another way software vendors and businesses developing their own custom applications will improve security this year is to build security features such as user authentication, data encryption, and identity management into the software.
There are products coming onto the market that will help. 2factor Inc. in February will begin shipping its Real Privacy Management software development kit, which is designed to let companies develop applications that perform continuous, mutual authentication and encryption. Unlike Secure Sockets Layer encryption, 2factor says its new product will authenticate and encrypt every transmission for both sender and receiver across any network, on any device.
Be AuthenticThe framework will offer open specifications that let authentication technologies such as hardware and software tokens, smart cards, and biometrics interoperate across networks. It's an important development because the Federal Financial Institutions Examination Council, a government standards body, has stipulated that financial-services companies must create two-factor authentication for online applications by year's end.
The next step in the evolution of authentication technology is mutual
authentication between a business and its customers, which lets
customers create a personal page that they use each time they log on to
a company's Web applications. If the customer is directed to a logon
page without the specified personal information, such as a favorite
phrase or a digital photo of a pet, the customer is warned that the
page might not be legitimate.
The initiative for Open Authentication, a consortium of 55 technology and user companies--including Diversinet, PortWise, and VeriSign--advocates this approach. It has submitted a draft to the Internet Engineering Task Force, an international standards organization, that outlines how to create mutual authentication within Web applications.
Since security is a numbers game that weighs risk against cost,
companies in 2006 would do well to assess the level of risk in their IT
environments and invest accordingly in security technology and user
education. The price of securing networks and Web applications may be
minimal when compared with lost business opportunities or, worse, lost
or stolen data.
=======================
Now the Transportation Security Administration is getting more selective — and that has its good and bad points.
TSA plans to train screeners at 40 major airports this year to ferret out suspicious characters. The strategy includes engaging travelers in casual conversation. Fliers who raise concerns will undergo extra physical screening and police questioning.
This seems to make sense. With more than 600 million passengers boarding planes each year, authorities need to focus resources on likely suspects.
Civil libertarians complain that this will lead to racial profiling, and worry about the TSA keeping demographic data secret.
These concerns are, so far, ungrounded. The psychological techniques have been tested during the past year at a half-dozen U.S. airports, including Miami International Airport, and no problems have been reported. Besides, would the ACLU prefer that demographic data be publicized?
TSA, meantime, is considering creating separate VIP screening for passengers. Travelers willing to pay a fee to a private company, probably $80 or more, undergo a background check and provide some sort of biometric ID could breeze through a separate screening — and keep their shoes on and their pants up.
In a test at Orlando International Airport, the average wait for the VIP screening was four seconds; for regular people, over four minutes. The maximum wait time for the VIPs was three minutes; the maximum for regular people, more than half an hour.
Understandably, frequent fliers like the idea. But should the government be creating preferred classes of people at taxpayer expense?
If the express-lane program ends up lengthening the lines for everyone else, that would seem to be taking two steps backward.
====================
50. Crystal ball
displaying technical advances by Gerard
Voland - Fort Waytne [Indiana] Journal Gazette - Jan 2, 2005
Source Next Contents
As we begin a new year, it might be encouraging to consider some of the
emerging technologies that will enter our lives by 2010.
I prefer to take this five-year view, rather than trying to predict
innovations for 2006, because many factors can affect the development
of new products and systems.
•In the realm of entertainment, two next-generation videodisc DVD
storage formats will be marketed widely during the next year.
The Blu-ray format (developed by Sony) has the capacity to store up to
30 gigabytes of data, and the HD-DVD system (developed by Toshiba and
NEC) has a storage capacity of 50 gigabytes. Each system will allow
users to record televised programs broadcast in high-definition mode
with its correspondingly huge amount of video and audio data.
In addition, new holographic videodiscs with light reactive crystals
are being developed that will allow information to be stored not just
on the surface of a disk but through it as well, increasing the storage
capacity to 1 terabyte (equal to 1,000 gigabytes). A laser will scan
the different layers of information, allowing people to store as many
as 300 motion pictures on a single holographic disk.
•In the world of computers, Microsoft will introduce its new operating
system, Windows Vista, by the end of 2006, providing both higher
performance and much greater protection against viruses and worms than
currently achieved.
•Wireless Internet communication will become more widespread as
long-distance broadband connection networks further develop.
Currently, WiFi local area network access points operate over
relatively short ranges, spanning distances of only a few hundred feet,
meaning that the user must be within a small hotspot range. In
contrast, new WiMax systems will use towers (similar to those for cell
phones) to extend their operation to hotspot sectors of 25 miles or
more, permitting people to communicate from virtually anywhere.
As a result, the number of mobile device users should increase
dramatically from the 650 million worldwide in 2004 to a much larger
number. Hopefully, both individual and collective productivity also
will increase.
•Soldiers will wear clothing that includes an on-board computer and
shock-absorbing materials to better protect the wearer from bullets and
shrapnel.
Combatants will be able to communicate more confidently with aircraft
and fellow soldiers, sharing data in a secure and immediate form. And
the weight of this equipment and clothing will be less than half of
that carried by today’s soldier.
•Cybernetics will become more prominent in health care and
rehabilitation.
For example, within the next two years a cyber hand developed by
researchers in four countries is expected to be implanted in amputees,
allowing users to control their artificial hands through the central
nervous system in a natural way.
•Given the worldwide concern about a possible pandemic, revised
manufacturing methods for quickly producing effective vaccines for bird
flu and other influenzas will be developed.
•Biometric identification techniques, radiation and motion sensors,
surveillance mechanisms and other devices will be augmented by new
systems for the war of terror.
The use of more traditional technology also will be expanded; for
example, England has been installing a national surveillance camera
system to better monitor automobile travel, with up to 35 million
license plates expected to be scanned each day in early 2006.
When fully implemented, the database system should be able to record
all automobile travel throughout the nation for a span of two years or
more. And all of us will continue to debate the relative costs and
benefits of such systems in terms of enhanced security versus
diminished personal privacy.
•Sports will be affected by new technologies, as illustrated by Adidas’
new soccer ball, the +Teamgeist.
With fewer seams and thermal bonding of materials, this ball is rounder
and more balanced than traditional soccer balls. Moreover, it retains
little water when wet, reducing the increase in weight from about 10
percent for regular balls to less than 0.1 percent, providing players
with more-consistent performance characteristics under a variety of
conditions. It will be the official ball of the 2006 FIFA World Cup
Germany.
•And as technology and the global economy advance rapidly with each
passing year, outsourcing of higher tech jobs to other nations is
likely to accelerate – making it more critical than ever that the
United States retains its position as the leading developer of emerging
technologies and their use in new products.
Gerard Voland is the dean of the School of Engineering, Technology and
Computer Science at Indiana University-Purdue University Fort Wayne.
Send questions and comments to him a volandg@ipfw.edu.
In a study, researchers at Clarkson University in Potsdam, N.Y., tested 66 fake fingers to see if they could outwit biometric devices, which identify individuals based on the physiological properties of their fingerprints or other body parts. The fake fingers went undetected more than half the time.
''Even if it comes from Play-Doh, the scanner has no way of knowing that. It is just taking a picture of an image,'' said Stephanie C. Schuckers, a Clarkson electrical and computer engineering professor who helped lead the research. ''People in the industry are aware this is an issue.''
The results, published this year in the IEEE: Transactions on Systems, Man, and Cybernetics journal, highlight a potentially huge vulnerability. Many hospitals and federal agencies use it for tracking people and restricting access. More than a million I.B.M. laptops have print-based safeguards built-in. Even some supermarkets allow their customers to swipe a finger instead of a credit card.
Biometric devices generally work by converting a fingerprint image into a series of numbers, just as a checkout-counter scanner reads a bar code. They do not capture so-called ''liveness'' characteristics, like the blood oxygen content or sweat.
To be sure, some biometric devices rely on an additional form of identification, like a PIN, to guard against fraud. But Dr. Schuckers hopes to introduce new technology that can detect pore perspiration patterns to prevent the biometric devices from being fooled. She has started a company, NexID Biometrics, to start licensing it next year.
Dr. Schuckers conceded it would take determined handiwork to pull off such a fraud. Besides lifting the latent fingerprint off a glass like a forensics specialist on the TV hit ''C.S.I.,'' a thief would need to scan, flip and then use ultraviolet light to etch the image onto printed circuit board before transferring it to the Play-Doh or gummy finger cast. ERIC DASHRe ''Is That a Finger or a Jell-O Mold?''
(Findings, Dec. 20): The biometric fingerprint ID on laptops may lead
to a direr outcome than the user might desire. When the technology
department of our firm introduced these machines to those of us
traveling to foreign countries, where the possibility of data theft
might be high, one of our team commented: ''Well, let's see. If they
want access to my files, they cut off my finger.''
Burt Kozloff
New York
===========================
56. Press Rlease -
HID Announces Availability of iClass OEM 13.56 MHz contactless smarct
card read / write module - Security Park.net - Jan 2, 2006
Source
Next Contents
====================
Jan.
9, 2006 issue - It sounds like a Hollywood techno-thriller: A shadowy
figure in Germany creates an unstoppable Internet worm that hides for
years from the cybercops. The trouble is, this is real life. The worm,
called Sober, has struck more than 30 times since its release in
October 2003. Most recently, on Nov. 22, 2005—Inauguration Day for
Germany's first female chancellor—Sober sent spam posing as e-mails
from America's CIA and FBI, Britain's National Hi-Tech Crime Unit and
the German Bundeskriminalamt. Next, authorities were girding for
ferocious spam assaults to commemorate the founding of the Nazi Party
on Jan. 5.
This high-stakes "hacktivism" makes great headlines, but law-enforcement officials worry that it is distracting attention from a far more worrying trend: rising Internet fraud. While hacktivists seek maximum public exposure to advance a political cause, fraud is all the more insidious because perpetrators and victims conspire to keep it hidden. This year promises to be the worst yet. Identity thieves are expected to steal more than $1 trillion. Cybercriminals are making so much money—more than the illegal drug trade last year, according to the U.S. Treasury—that they've been doing their own R&D.
That research is already bearing fruit. Experts worry that direct theft of data (as opposed to phishing, in which customers are tricked into giving away data) is on the rise. Identity thieves are now able to target specific attacks against specific people or companies, and they can select their targets based on factors like net worth. The pre-Christmas attack on credit-card users at Sam's Club stores in the United States is an example of what lies ahead, says George Waller of the cybersecurity firm StrikeForce Technologies. Several hundred customers who bought gas as the stores had their credit-card data stolen (Sam's Club isn't saying how). "The days of mass worms and things like phishing scams are largely over," says Joe Payne, vice president of the Virginia-based Verisign iDefense, which tracks cybercrime.
In addition to merchants, midsize banks are another likely spot for criminal attacks. While last year the biggest banks threw plenty of resources into improving online security in response to a rash of embarrassing identity thefts, small banks are still vulnerable to everything from keyloggers to worms and botnets. Indeed, $24 billion in bank deposits are at risk each day in the United States alone.
Another innovation among fraudsters is to target kids. Waller warns that keyloggers, an advanced form of spyware, are making their way onto the MP3 files that Junior happily downloads to the family PC. These tiny programs track every keystroke the user makes, allowing fraudsters to monitor and record online transactions.
And then there's China, where Internet penetration is expected to top 10 percent in 2006. Because China's PCs don't generally run licensed versions of Microsoft's Windows, they're not eligible for the security patches Microsoft makes available to its legitimate users. Hackers have already taken control of the PCs of thousands of unsuspecting Chinese and used them as a platform from which to launch spam attacks. These so-called botnets are routinely bought, sold and swapped in Internet chat rooms.
The news isn't all bad. Prices for identity authentication systems using biometric data are falling, and public resistance to them is diminishing. Expect to see them rolled out in the second half of the year in big banks, and later in smaller outfits. Until then, keep your firewalls up and your fingers crossed.
========================
59. Two Cents:
Lenovo ThinkCentre M51 -
- Government Technology - Jan 2, 2006
Source
Next Contents
3: Registered travelers get rolling
Airport security should get easier for some travelers as the Transportation Security Administration launches a program this year that creates special checkpoint lines with less-stringent screening.
The Registered Traveler program is open to those who pass a terrorism background check and pay a fee, likely $80 to $100. Participants will get a card embedded with their biometrics — fingerprints and iris scans. They'll use it to get into special lines. On Jan. 20 the security agency will announce RT advantages. It is looking at waiving requirements to remove shoes and coats and take laptops from cases.
The official start date is June 20, and airports are lining up to get RT ready to go. Verified Identity Pass, founded by former media mogul Steven Brill, has signed with the San Jose, Calif., airport to enroll registered travelers, make ID cards and install and operate card-reading kiosks. VIP is negotiating with Sacramento's airport and was the sole bidder at Indianapolis International Airport, the company says.
VIP runs the only RT program presently operating, in Orlando, where more than 10,000 people have paid $80 for a one-year enrollment. The TSA has completed test programs at other airports.
Traveler groups and federal lawmakers have pushed for RT to shorten security lines for "trusted travelers." Some people, such as former TSA administrator John Magaw, have warned that terrorists could enroll and bypass rigorous scrutiny.
<>=======================You might call Rolland Safe & Lock a 100-year-old start-up company.
Invigorated by advancing technology and new business opportunities, the Dallas-based safe company is exhibiting all the traits of firms a fraction its age.
Revenue is growing at double-digit rates, new customers are pouring in, and the family-owned business has locked up a new chief executive to manage its growth.
Owner and president Rick Rolland said the industry has changed over the last several years.
"I think any small business, or any large business, for that matter, is going to have to accept the change," he said. "It's been exciting for us because it really opens more doors than it closes."
One hundred years ago, the definition of innovation in the safe industry was an iron sphere that lacked corners and seams and was thus resistant to dynamite.
Today, cutting-edge safes include electronic keypads, biometric sensors, time-delay devices and even Internet connections.
Mike Oehlert, technical adviser for the Dallas-based Safe and Vault Technicians Association, said that Rolland Safe & Lock has been more successful than many similar firms in reacting to shifts in the industry.
"They have focused more on the higher end of things, the commercial marketplace, than a lot of the other shops, the smaller shops, have, and that's what helped them to grow," he said.
The $10 million company's most recent growth spurt has come from the pawn industry, thanks to the new PawnGuard 35 safe.
The safe, developed in conjunction with major pawn companies, has 35 steel drawers each linked to electronic time delays to prevent thieves from cleaning out the entire safe in a couple of minutes.
Austin-based EZ Corp., which has almost 300 pawnshops in 12 states and worked with Rolland to design the PawnGuard, has installed the $12,000 safes in 44 of its pawnshops since they went on sale in mid-2004.
Tony Gallo, director of loss prevention and risk management for EZ, said the chain is the target of 10 to 20 armed robberies a year, costing about $500,000 altogether.
In the stores with PawnGuards, there have been nine robbery attempts that, if successful, would have cost about $1 million.
Mr. Gallo said the future of the industry lies in complex electronic safes such as the PawnGuard and upcoming models that can transmit warnings to a central office.
"I think that we're going to have what I refer to as smart safes as we go down the line," he said.
That transformation isn't lost on Mr. Rolland and his firm.
"We've all accepted the fact that we're not just selling steel anymore," Mr. Rolland said.
For example, a new line of safes includes Internet connections.
"Now, in Dallas, you can call up a safe in Seattle and see who went in it and how long they went in it," Mr. Rolland said.
Employers can also assign a different entry code for each employee and change or deactivate codes when employees leave the firm.
The locks – called IP locks for Internet protocol – essentially double as alarm systems.
"I think the real magic with the IP lock is what they call exception reports," Mr. Rolland said. "The exception report would be, say, three successive failed combination access attempts. That IP lock would then send out an e-mail message to their e-mail site or cellphone and say, 'Someone's trying to get into the safe who's not authorized.' "
When a customer comes to Rolland Safe & Lock, the engineers at the company design a prototype safe and outsource the safe and lock construction to firms around the world.
Rolland then assembles the two components, as well as handling installation and service, which can be just as critical as the design.
"If a jeweler can't open his safe on the 23rd of December, he's lost half of his yearly revenue in that one day, in most cases," Mr. Rolland said.
For most of its history, Rolland focused on small jewelry stores and other single-sale clients.
In the 1990s, the company began selling to large retail and restaurant chains, clients with hundreds or thousands of locations, each equipped with a safe.
The company's client list includes Hilton Hotels Corp., McDonald's Corp., J.C. Penney Co., FedEx Corp., the Container Store and Southwest Airlines Federal Credit Union, among others.
Roughly 60 percent to 70 percent of Rolland's revenue comes from those large commercial customers, who represent about a $500 million market, Mr. Rolland said.
Overall, he said, the broader market for vaults and safes has been growing at a healthy pace, fueled largely by banks expanding their branch networks.
Industry leaders, such as Diebold Inc., dominate the sector serving financial institutions.
The company also does work for the much larger financial sector, including bank vaults that can cost up to $150,000.
"Our growth has been double digits since we started focusing on chains in the late 1990s," he said. "We've projected almost a 20 percent growth for next year and have experienced 30 percent growth this year."
Two months ago, the company brought in a new chief executive officer with management experience at 7-Eleven and other large firms to formulate a growth strategy.
"The growth opportunity is there, the market opportunity is there, but as we bring in the additional business, it's important that we take care of the customers," said Mike Manor, the new CEO. "Don't go out there and just try to make sales. Take care of the customers for the long haul."
Mr. Manor said he wants to streamline the company's operations before considering major expansion, possibly through acquisitions. "We want to make sure our process is straight before we make it go faster," he said.
==============================Version3, Inc., developer of Version3 Simple Sign-On, has announced the availability of Version3 Simple Sign-On v2.0 Solution Suite -- the most comprehensive enterprise single sign-on solution suite on the market today.
Integrated with Microsoft Active Directory, Simple Sign-On is an identity management solution based on Microsoft Active Directory, which gives users seamless and secure access to run their Windows and SharePoint- based applications without compromising security.
At its core, Simple Sign-On is an Identity Management element that frees users from remembering user names and passwords for multiple applications, web sites, and legacy systems. Simple Sign-On can be configured to give users secure access to all required line of business applications using one set of network security credentials.
Simple Sign-On delivers Enterprise (Desktop) and WEB single sign-on (WEB Portal SSO), Web Integration, Browser based ESSO, Simple Sign-On is tightly integrated with Microsoft Active Directory, leveraging an existing network infrastructure to provide a rich feature set of Application Management tools.
Users simply supply logon credentials to the network using their Microsoft Active Directory identity and access to applications is provided by shortcuts published to the users desktop."Our new Simple Sign-On 2.0 platform applications are designed to help companies increase security, cut costs and improve efficiency through our application access management suite," said Andy Sakalian, President of Version3, Inc.
"We've designed a full single sign-on product suite with a very rich feature set and unparalleled integration with Microsoft Active Directory."
Version3 Simple Sign-On Editions:
• Enterprise SSO
• Enterprise/Desktop Single Sign-On
• Connection Management
• Application Publishing
• Multifactor Authentication
• Kiosk Support
• Auditing and Monitoring Web SSO
• Browser based ESSO
• ompatible for simultaneous Internet and intranet access
• Includes complete complement of SharePoint interfaces and web parts Enhanced Authentication
• Mutual Authentication for IIS Server farms
• Support for non-Windows platforms
• Supports all current shipments of Microsoft platform products (i.e. Exchange-OWA, SharePoint, Class Server
• Built-in support for Active Directory Authorization Manager
Version3's Simple Sign-On solves password management problems by providing single sign-on for Microsoft Windows and SharePoint Products and Technologies with Active Directory.
This type of application access management allows the user to sign into their network or portal once and get access to all their applications. Administrators need only create one identity access for each user and manage authentication through Active Directory to authorize access to the user's applications.
"Our goal is to extend Simple Sign-On 2.0 across all applications through Microsoft Active Directory. The enhanced security and administration advantages allows seamless, secure activation of any application accessible via the windows desktop," said Sakalian.
The upgrade to Version3 Simple Sign-On v2.0 is free to all existing customers who are under a maintenance plan. New users can purchase Version3 Simple Sign-On v2.0 on a per user basis or contact Version3 for enterprise pricing.
The product is available through authorized dealers and Version3.About Version3Version3, Inc., based in Columbia, South Carolina, provides a comprehensive security and application access management product for the identity management industry.
Founded in 2002, Version3 develops Version3 Simple Sign-On which delivers Desktop and Enterprise SSO, Web Integration, Browser based ESSO.
==========================
64.
Press Release - WinMagic Disk Encryption Technology Now Included with
New Toshiba Dynabook Notebooks in Japan - Military Imbedded Systems
- Jan 3, 2006
Source Next Contents
01/03/2006
(Mississauga, Ontario: January 3, 2006) WinMagic® Inc.
(www.winmagic.com),
the innovative leader in full-disk encryption
solutions, announces that its SecureDoc® disk encryption software
has
been bundled with Toshiba's new notebook PCs. Toshiba now includes the
SecureDoc disk encryption software in their new dynabook Satellite J50
series and dynabook Satellite T20 series notebooks in Japan when they
are shipped to customers.
SecureDoc protects information stored on laptops and desktops by
encrypting the entire disk and employing secure user authentication
during a computer's pre-boot sequence where true user authentication
should take place. SecureDoc's pre-boot authentication is unique in
allowing multi-factor authentication through a combination of password,
hardware token, biometrics, and Public Key Infrastructure (PKI).
WinMagic's SecureDoc encryption software provides a powerful, proven,
cost-effective and transparent method to prevent sensitive data from
falling into the wrong hands.
"As data security becomes a bigger concern for both businesses and
government, SecureDoc is quickly becoming the de facto standard," says
Thi Nguyen-Huu, CEO, WinMagic. "The fact that Toshiba, the world's
largest laptop manufacturer, is offering their customers SecureDoc
bundled with their products indicates the importance of our solution in
the market."
SecureDoc bundled in Toshiba notebooks features localized Japanese
language, pre-boot integration with international and Japanese
smartcards, and tokens such as ActivKey, eToken, iKey, and JUJO's
HardKey. The bundled software is called "SecureDoc 90-day trial
version" and its usage is limited to 90 days. Users can easily transfer
the trial version to the regular version by entering an authorized
license code.
"We are very pleased with our exclusive distributor NCL Communications
in Japan," added Mr. Nguyen-Huu. "Within a short time NCLC has brought
us several important customer agreements, the latest with Toshiba."
"WinMagic's SecureDoc is the best solution among several disk
encryption tools, in its performance, SmartCard and tokens integration,
and the user management features. We are very pleased SecureDoc was
selected by Toshiba as the security feature for their new notebook
PCs," says Mr. Oda, CEO, NCL Communications K.K.
The dynabook Satellite J50 series and T20 series notebooks were
introduced this month by Toshiba in Japan. SecureDoc full-disk
encryption is a substantial part of Toshiba's new offerings to appeal
to business customers. An extensive print and web advertising campaign
is being launched by Toshiba in support of the new notebooks featuring
SecureDoc full-disk encryption.
For media information, including requests for interviews or review
copies of SecureDoc, contact Chuck Hester, APR, director of public
relations, Koroberi, Inc. (www.koroberi.com), by phone at
(919)
960-9794 ext. 24 or by e-mail at chuck@koroberi.com.
#####
About WinMagic Inc.
WinMagic® Inc. (www.winmagic.com) develops disk
encryption software.
Its SecureDoc® line of products ensures protection of sensitive
information stored on desktops and laptops by employing authentication
from password to hardware token, biometrics and PKI, commencing right
at pre-boot time. WinMagic's award-winning products fulfill the
requirements of even the most security-conscious users by focusing on
concrete security features while still offering unparalleled
flexibility. Utilizing Public Key Cryptographic Standards PKCS-11 from
the ground-up for extreme adaptability, the SecureDoc line has earned
an impressive list of validations, including NIST Cryptographic Module
Validation and FIPS 140-1 Level 2, and is scheduled to obtain the
Common Criteria Evaluation Assurance Level 4 (EAL-4) certification.
WinMagic Inc. is a Canadian company based in Mississauga, Ontario. For
more information concerning WinMagic's products or services, please
visit the company website, call 1-888-879-5879 toll-free in North
America or +1 905 502-7000 worldwide, or e-mail info@winmagic.com.