122 research outputs found
Body language, security and e-commerce
Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations
Hyperbolic Browsers: From GUI to KUI
This paper studies the development of web browsers and describes a hyperbolic browser, a dynamic browser that organizes information visually
XML in Action
This paper reviews xreferplus and describes its use of a link resolver and hyperbolic browser
3D Data Storage
This paper discusses holographic data storage as an option for high-density data storage. It describes the technology and its benefits
For SFX See Librarian
This paper explores SFX as a tool to provide seamless access to electronic resources in the fewest steps possible. It discusses the concept of the Open URL and the Link Resolver
Newfire\u27s Higher Education Partner Program
This paper announces the Newfire Higher Education Partners Program. It describes the program, participating institutions, and possible future development
Arnold’s Treason: The French Connection
This paper speculates on Benedict Arnold\u27s hatred of the French as a cause of his treason. It includes the text of Arnold\u27s Proclamation ... To all the officers and soldiers of the continental army which is presented as an apologia for his treason. It also includes an editorial comment from the first issue of the Gazette Francoise published in Newport, RI by the French navy
2nd Rhode Island Musket
This paper examines a musket with unique markings (2 RI) and reports on the weapon\u27s authenticity
Biometrics and Network Security
This paper examines the techniques used in the two categories of biometric techniques (physiological and behavioral) and considers some of the applications for biometric technologies. Common physiological biometrics include finger characteristics (fingertip [fingerprint], thumb, finger length or pattern), palm (print or topography), hand geometry, wrist vein, face, and eye (retina or iris). Behavioral biometrics include voiceprints, keystroke dynamics, and handwritten signatures
Extending the Life-Cycle of Optical Media
This paper examines the products that two companies provide to protect optical media and to eliminate scratches, gauges, and other marks that deface the playing surface
- …