A New Era for Mobile Payment

English version not available yet.

The IoT and ultrasound sensors for help to pedestrians

Pedestrians are often victims of collisions with motor vehicles. To provide a solution to this situation, researchers from the University of Applied Sciences in Frankfurt (FRA-UAS) have developed a sensor that can discriminate human beings [...]

IT Services Offshoring and Security

Over a thousand employees work in research laboratories of Trend Micro Labs in Manila to track down cyber threats of any kind. Trend Micro, founded in the US by Taiwanese experts, has installed its headquarters [...]

Unexpected consequences for IoT

What’s new at the big players! Verizon enters the IoT. Sprint has opened a partnership with DriveSync in 2014 to offer the UBI Intelligence Service of IMS (Intelligent Mechatronic Systems related to insurance contracts). AT [...]

Security by high bitrate encoding

The new encoding device CN8000 from Gemalto provides ten times 10 Gb/s-encoding in total. It meets the data security needs for enterprises, data centers and cloud service providers that are use larging networks. Gemalto, expert [...]

M2M and IoT in Saudi Arabia

Machine to Machine (M2M) and Internet of Things (IoT) applications are developing rapidly in Saudi organizations, involving system integrators to telecommunications network operators. According to market analysis conducted by IDC (International Data Corporation) in the [...]

Peru’s electronic ID card

National Electronic ID Card (DNIe) of Peru issued by the National Registry of Identification and Civil Status (Reniec) has been considered to be the best ID card in Latin America during the Latin American Conference [...]

Apple Pay Launching in UK with £20 Contactless Transaction Limit

Apple announced that, with the support of 250,000 merchants, Apple Pay service will be available from July 2015 in the UK. To support the launch of this service, Apple has set up a website with [...]

Perimeter security reveals a gap between perception and reality

Gemalto, a digital security expert, has announced the results of its study on the confidence index Safety data DSCI 2015 (Data Security Confidence Index). This survey of IT decision makers around the world reveals a [...]

The safety of the Internet of Things

With a large number of connected objects IoT or the Internet of Things represents a major market that is growing strongly. It assumes to be able to interconnect billions of devices in the safest conditions. [...]

Security expert speaks

Eyrolles 9782212139631_pr

Today, our Section “The Expert Pages” is devoted to practical advice on securing the enterprise information system provided by Alexandre Fernandez-Toro for all IT managers in a book recently published in French by Eyrolles Editions. [...]

Identification card without photo or Identity control through the Smartphone?

The US Senate must solve the following problem with a Senate Committee of the State of Indiana. Indiana Amish population cannot accept, for religious reasons, to be photographed. As a result, these people do not [...]

ID Cards improvements

No one is a prophet in his own country! In France, the establishment of a secure electronic national identity card (ID Card) had upset the elites and the implementation of this innovation has been cancelled. [...]

Electronic medicine, a forceps birth, especially in France!

The novelty scared sometimes, but mostly, it disturbs the habits and acquired positions. For some, it is necessary to be vigilant and to nip in the bud any new proposal. And medicine, the arguments are [...]

iPhone 6 or electronic identity card?

The iPhone 6 Apple terminal could play the role of security clearance and of payment card in workplaces and universities, since it has both biometric security features and mobile payment applications. Softwares for new smartphones, [...]

Fraud proof credit cards using quantum physics

Using a system based on quantum physics, dubbed Quantum Secure Authentication, it is possible to make credit cards and ID cards fraud proof, say researchers from Eindhoven University of Technology and UT research institute MESA+. According [...]

The future of mobile wallets

Apple Pay technology represents two thirds of the purchases made in contactless payment for the three major US networks cards. However, the total is far from being compared to the $ 46 billion mobile payment [...]

Biometric ID card program in West Africa (ECOWAS) for 2016

The Economic Community of West African States (ECOWAS) includes fifteen West African countries. Founded in 1975, its mission is to promote economic integration in the region. The organization works in three languages: French, English and [...]

Seeking a reliable and fast payment solutions

Oxigen, payment solutions provider based in India, is expanding. The company must quickly hire young talent because it has to participate in the creation of payment networks in semi-urban and rural areas and to invest [...]

LoRa is associating M2M to the Internet of Things

The Internet of Things and innumerable M2M applications open new perspectives in the world of telecoms. Bouygues Telecom is setting up a network for the Internet of Things, based on a competing M2M technology to [...]

Planning relations between European Electronic Government Administrations

The European Commission has released the 2015 version of the eGovernment factsheets for each of the 28 EU Member States. These documents provide a comprehensive overview of digital management activities recommended among member countries and [...]

Cyber Threat Detection thanks to Advanced Features

LogRhythm Company, expert in Security Intelligence, is selling new case management features and analysis, allowing customers to detect threats more quickly with high impact power, reducing reaction time and neutralizing any damaging cyberattacks. Available now [...]

Elimination of corruption with electronic ID cards

Indian Prime Minister Narendra Modi wants to take the fingerprints of 1.2 billion people to save $ 12 billion a year. The fight against corruption will fund about what India spends annually on education. With [...]

The glorious uncertainty of the Internet protocols

That’s fifteen to twenty years we run after the general establishment of IPv6 addressing and that we are expecting a stabilized definition of the SIP session management protocol. Here youth has spent many springs wanting [...]

Card Data Security Compliance

According to a new report by Verizon Communications Inc, our out of five global retailers and other merchants failed interim tests to determine whether they are in compliance with payment card data security standards. This [...]

Russia is studying a mandatory biometric registration

Political Russian Party LDPR has drafted a bill that would obligate all citizens to submit fingerprinting and DNA profiling on a biometric ID Card, in order to improve security. It also suggests that a new [...]

A difficult task awaits Apple over the next six months

Apple’s ambitions put the company at a relatively heavy agenda in 2015. Apple watch defies chonique and Apple must find a place for it either in the jewelry and luxury boutiques or in the horlorgeries. [...]

Triple cooperation for a secured tablet

At CeBIT 2015 in Hanover, Samsung, BlackBerry and IBM unveiled a tablet called SecuTablet. This is a model of Galaxy Tab 10.5 Samsung S aimed at both professionals and the general public and in which [...]

The danger of connected cars

A recently filed class action lawsuit claims that Toyota, Ford and General Motors would knowingly put consumers at risk by selling cars including connected features likely to be controlled remotely by hackers. The complaint filed [...]

Chinese Smart Cards

Digital enters into the life of the Chinese. Beijing has already issued more than 15 million social security cards and more than 70 million municipal transport cards. At the same time, the number of identification [...]

Articles précédents

© 2015 Strategies Telecoms & Multimedia | Contact |  -