Wednesday, April 7, 2010
Corporate Blogging
Corporate blogging gives individuals located throughout various points in the world to connect and discuss a variety of issues within their organization. Furthermore, blogging allows individuals to connect with one another in a more personal setting than an email or memorandum.
Furthermore, its disadvantages include that to make a corporate blog successful, you have to spend some time with it. A 200-word post every week doesn’t give your target audience much reason to visit, let alone come back. Also, Blogging by committee is a bad idea. There has to be one person up front, serving as the editor-in-chief. Your lead blogger will write and edit posts, identify topics, and manage the environment.
References:
1. http://technorati.com/business/gurus/article/five-reasons-why-corporate-blogs-fail/#ixzz0kT99bJwh
2. http://www.debbieweil.com/book/
Disadvantages
To make these security systems more reliable, it's a good idea to combine the biometric analysis with a conventional means of identification, such as a password (in the same way an ATM requires a bank card and a PIN code).
The real problem with biometric security systems is the extent of the damage when somebody does manage to steal the identity information. If you lose your credit card or accidentally tell somebody your secret PIN number, you can always get a new card or change your code. But if somebody steals your fingerprints, you're pretty much out of luck for the rest of your life. You wouldn't be able to use your prints as a form of identification until you were absolutely sure all copies had been destroyed. There's no way to get new prints.
References:
1. http://computer.howstuffworks.com/fingerprint-scanner5.htm
2. http://articles.techrepublic.com.com/5100-10878_11-5030410.html
Advantages
• Physical attributes are much harder to fake than identity cards.
• You can't guess a fingerprint pattern like you can guess a password.
• You can't misplace your fingerprints, irises or voice like you can misplace an access card.
• You can't forget your fingerprints like you can forget a password.
• Dirty or greasy hands don’t hamper the quality of templates recorded by a hand reader.
• Buddy punching, the problem faced by most of the organizations, is solved by these biometric devices.
• Employee card systems are completely eliminated, thereby saving the cost of maintaining employee records and removing the possibility of frauds.
• Cost for manual preparation of reports like worked hours, lateness, leaves etc is also reduced by hand recognition devices.
• These devices are fast, accurate and can be easily integrated in the existing environment
References:
1. http://techbiometric.com/biometric-products/hand-scanner/
2. http://computer.howstuffworks.com/fingerprint-scanner5.htm
Other Technology
In very early days, our ancestors intuitively understand that certain characteristics could serve for purpose of identification. In a very developed technology today, the human systemic are still can be used as a identification system. Now we can use a fingerprint scanner to get an person’s identification. Biometric is a modern technique in solve to very old concerns with indisputable proof of identity base on a fingerprint and even on PC keyboards.
References:
1. http://computer.howstuffworks.com/fingerprint-scanner.htm
2. http://www.biometric-fingerprint.com/fingerprint-scanner.html
Introduction
Hand scanner works by creating and storing the templates of hand geometry in a biometric device, which are later used for identification and verification processes. Used mainly as employee attendance clocks, these devices have completely changed the scene of business organizations. Due to its association with biometric technology, a hand reader is capable of providing accurate results.
Among all the biometrical technology, fingerprint-based identification is the most widely used in security applications; simply, everyone has their unique, immutable fingerprints. Commercially, fingerprint matching is one of the most efficient to authenticate an authorize entry, access to confidential data. Fingerprint matching techniques falls into two categories: minutiae-based and correlation based. Minutiae-based techniques find the minutiae points and then mapping them on the finger. The shortcoming of this method is difficult to extract the minutiae points accurately if the fingerprint is of low quality. Whereas, correlation-based techniques need the precise location of a designated point and a image translation. There are difficulties in either method; therefore, developing fingerprint modules for different security devices is very crucial in the industry.
References:
1. http://techbiometric.com/biometric-products/hand-scanner/
2. http://www.biometric-fingerprint.com/fingerprint-scanner.htm