THE WHATIS.COM WORD-OF-THE-DAY   
March 29, 2004

fingerscanning 

_____________
SPONSORED BY: Win a wireless keyboard and mouse!

Enter our daily Info Quest contest  -- each response qualifies you
for our daily prize draw! Each time you enter (once per day,
Monday-Friday) you also get a chance in the final draw for a
Microsoft wireless keyboard and mouse on April 15. 
http://whatis.techtarget.com/content/0,290959,sid9_gci954359,00.html?track=NL-34&ad=479244

Congratulations to Al Chandler for winning Friday's drawing!  Your
prize is in the mail.
 
______________________   
TODAY'S WORD: fingerscanning 

See our complete definition with hyperlinks at
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci957086,00.html?track=NL-34&ad=479244

Fingerscanning, also called fingerprint scanning, is the process of
electronically obtaining and storing human fingerprints. The digital
image obtained by such scanning is called a finger image. In some
texts, the terms fingerprinting and fingerprint are used, but
technically, these terms refer to traditional ink-and-paper processes
and images.

Fingerscanning is a biometric process, because it involves the
automated capture, analysis, and comparison of a specific
characteristic of the human body. There are several different ways in
which an instrument can bring out the details in the pattern of
raised areas (called ridges) and branches (called bifurcations) in a
human finger image. The most common methods are optical, thermal, and
tactile. They work using visible light analysis, heat-emission
analysis, and pressure analysis, respectively. 

Biometric fingerscanning offers improvements over ink-and-paper
imaging. A complete set of fingerscans for a person (10 images,
including those of the thumbs) can be easily copied, distributed, and
transmitted over computer networks. In addition, computers can
quickly analyze a fingerscan and compare it with thousands of other
fingerscans, as well as with fingerprints obtained by traditional
means and then digitally photographed and stored. This greatly speeds
up the process of searching finger image records in criminal
investigations. 
 
______________________
RELATED TERMS:

biometric 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci211666,00.html?track=NL-34&ad=479244&ad=479195
 

bifurcation
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci957106,00.html?track=NL-34&ad=479244

______________________
SELECTED LINKS:

Simo Huopio of Helsinki University of Technology discusses biometric
capture technologies. 
http://www.tml.hut.fi/Opinnot/Tik-110.501/1998/papers/12biometric/biometric.htm#ch3.3

SearchSecurity.com offers selected links to articles about
biometrics. 
http://searchsecurity.techtarget.com/bestWebLinks/0,289521,sid14_tax289190,00.html?track=NL-34&ad=479244&ad=479195
 

_____________________
TODAY'S TECH NEWS:

  
MORE THAN A BROWSSER; USING MOZILLA IN ENTERPRISE ENVIRONMENTS
To most people, Mozilla is just a Web browser. If the corporate IT
professional thinks of Mozilla in this way, however, he or she could
be missing out on a tool that's useful in many enterprise
environments. 
http://searchenterpriselinux.techtarget.com/originalContent/0,289142,sid39_gci956309,00.html?track=NL-34&ad=479244

I SPY WITH MY LITTLE EYE...SOMETHING CONFIDENTIAL
The proliferation of cell phones with built-in cameras has provided a
swarm of "little eyes" in today's workplace, and experts warn that
unwary companies could be at risk. 
http://searchmobilecomputing.techtarget.com/originalContent/0,289142,sid40_gci956357,00.html?track=NL-34&ad=479244

IT-BUSINESS ALIGNMENT ELUSIVE FOR SOME
While nearly all organizations recognize the importance of aligning
IT and business strategy, very few believe they are doing it right,
according to a recent survey from Deloitte Consulting LLP. 
http://searchcio.techtarget.com/originalContent/0,289142,sid19_gci956494,00.html?track=NL-34&ad=479244
 
>> Catch up on all the latest IT news at  
http://searchtechtarget.techtarget.com?track=NL-34&ad=479244

______________________
SECRET WORD-OF-THE-DAY | What is IT?

This is a procedure, sometimes carried out by an ethical hacker, that
looks for security holes in an information system. 

Do you think you know the Secret Word? Click to see if you're right!
http://searchmobilecomputing.techtarget.com/gDefinition/0,294236,sid40_gci929671,00.html?track=NL-34&ad=479244

______________________
IT SURVIVAL KIT | Wireless

We've gathered some basic resources to help you stay on top of new
wireless standards.
http://searchcio.techtarget.com/infoCenter/tip/0,294276,sid19_gci956202_tax296045,00.html?track=NL-34&ad=479244&ad=479195

______________________
CAREER CENTER | Dice.com
 
Looking for a new job? Visit the WhatIs.com Career Center powered by
Dice and find over 37,000 tech positions to choose from. Find
training and certification resources, get help with your resume and
more. Visit today!
http://whatis.techtarget.com/dice/0,294542,sid9,00.html?track=NL-34&ad=479244&ad=479195&Offer=dicewhssrp34

______________________
HOROSCOPES FOR GEEKS | March

Find out what the stars have in store for you the rest of this month!
http://searchcio.techtarget.com/sDefinition/0,,sid19_gci919205,00.html?track=NL-34&ad=479244&ad=479195

______________________________ 
RECENT ADDITIONS AND UPDATES 

(1) home network
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci213434,00.html?track=NL-34&ad=479244

(2) real life
http://whatis.techtarget.com/definition/0,,sid9_gci554245,00.html?track=NL-34&ad=479244

(3) cocooning
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci956291,00.html?track=NL-34&ad=479244

(4) canned air
http://whatis.techtarget.com/definition/0,,sid9_gci956267,00.html?track=NL-34&ad=479244

(5) broadband voice gateway
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci956311,00.html?track=NL-34&ad=479244

____________________________________________________________________
:::::::::::::::::::  WHATIS.COM CONTACTS   :::::::::::::::::::

MARGARET ROUSE, Site Editor ([EMAIL PROTECTED])

IVY WIGMORE, Consulting Editor ([EMAIL PROTECTED])

LOWELL THING, Consulting Editor and Founder ([EMAIL PROTECTED])

GABRIELLE DERUSSY, Advertising ([EMAIL PROTECTED])

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This e-newsletter is published by WhatIs.com, a targeted Web site
from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and
conferences for enterprise IT professionals.
Copyright 2004 TechTarget. All rights reserved.
_____________________________________________________________________

To unsubscribe from "Word of the Day":
 
Go to unsubscribe: http://WhatIs.com/u?cid=479244&lid=430801&track=NL-34&ad=479244
 
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.
 
Contact us:
WhatIs
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to