122 research outputs found

    Body language, security and e-commerce

    Get PDF
    Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations

    Hyperbolic Browsers: From GUI to KUI

    Get PDF
    This paper studies the development of web browsers and describes a hyperbolic browser, a dynamic browser that organizes information visually

    XML in Action

    Get PDF
    This paper reviews xreferplus and describes its use of a link resolver and hyperbolic browser

    3D Data Storage

    Get PDF
    This paper discusses holographic data storage as an option for high-density data storage. It describes the technology and its benefits

    For SFX See Librarian

    Get PDF
    This paper explores SFX as a tool to provide seamless access to electronic resources in the fewest steps possible. It discusses the concept of the Open URL and the Link Resolver

    Newfire\u27s Higher Education Partner Program

    Get PDF
    This paper announces the Newfire Higher Education Partners Program. It describes the program, participating institutions, and possible future development

    2nd Rhode Island Musket

    Get PDF
    This paper examines a musket with unique markings (2 RI) and reports on the weapon\u27s authenticity

    Biometrics and Network Security

    Get PDF
    This paper examines the techniques used in the two categories of biometric techniques (physiological and behavioral) and considers some of the applications for biometric technologies. Common physiological biometrics include finger characteristics (fingertip [fingerprint], thumb, finger length or pattern), palm (print or topography), hand geometry, wrist vein, face, and eye (retina or iris). Behavioral biometrics include voiceprints, keystroke dynamics, and handwritten signatures

    Extending the Life-Cycle of Optical Media

    Get PDF
    This paper examines the products that two companies provide to protect optical media and to eliminate scratches, gauges, and other marks that deface the playing surface

    Arnold’s Treason: The French Connection

    Get PDF
    This paper speculates on Benedict Arnold\u27s hatred of the French as a cause of his treason. It includes the text of Arnold\u27s Proclamation ... To all the officers and soldiers of the continental army which is presented as an apologia for his treason. It also includes an editorial comment from the first issue of the Gazette Francoise published in Newport, RI by the French navy
    • …
    corecore