Electronic medicine, a forceps birth, especially in France!

The novelty scared sometimes, but mostly, it disturbs the habits and acquired positions. For some, it is necessary to be vigilant and to nip in the bud any new proposal. And medicine, the arguments are [...]

Identification card without photo or Identity control through the Smartphone?

The US Senate must solve the following problem with a Senate Committee of the State of Indiana. Indiana Amish population cannot accept, for religious reasons, to be photographed. As a result, these people do not [...]

ID Cards improvements

No one is a prophet in his own country! In France, the establishment of a secure electronic national identity card (ID Card) had upset the elites and the implementation of this innovation has been cancelled. [...]

iPhone 6 or electronic identity card?

The iPhone 6 Apple terminal could play the role of security clearance and of payment card in workplaces and universities, since it has both biometric security features and mobile payment applications. Softwares for new smartphones, [...]

Fraud proof credit cards using quantum physics

Using a system based on quantum physics, dubbed Quantum Secure Authentication, it is possible to make credit cards and ID cards fraud proof, say researchers from Eindhoven University of Technology and UT research institute MESA+. According [...]

The future of mobile wallets

Apple Pay technology represents two thirds of the purchases made in contactless payment for the three major US networks cards. However, the total is far from being compared to the $ 46 billion mobile payment [...]

Biometric ID card program in West Africa (ECOWAS) for 2016

The Economic Community of West African States (ECOWAS) includes fifteen West African countries. Founded in 1975, its mission is to promote economic integration in the region. The organization works in three languages: French, English and [...]

Seeking a reliable and fast payment solutions

Oxigen, payment solutions provider based in India, is expanding. The company must quickly hire young talent because it has to participate in the creation of payment networks in semi-urban and rural areas and to invest [...]

LoRa is associating M2M to the Internet of Things

The Internet of Things and innumerable M2M applications open new perspectives in the world of telecoms. Bouygues Telecom is setting up a network for the Internet of Things, based on a competing M2M technology to [...]

Planning relations between European Electronic Government Administrations

The European Commission has released the 2015 version of the eGovernment factsheets for each of the 28 EU Member States. These documents provide a comprehensive overview of digital management activities recommended among member countries and [...]

Cyber Threat Detection thanks to Advanced Features

LogRhythm Company, expert in Security Intelligence, is selling new case management features and analysis, allowing customers to detect threats more quickly with high impact power, reducing reaction time and neutralizing any damaging cyberattacks. Available now [...]

Elimination of corruption with electronic ID cards

Indian Prime Minister Narendra Modi wants to take the fingerprints of 1.2 billion people to save $ 12 billion a year. The fight against corruption will fund about what India spends annually on education. With [...]

The glorious uncertainty of the Internet protocols

That’s fifteen to twenty years we run after the general establishment of IPv6 addressing and that we are expecting a stabilized definition of the SIP session management protocol. Here youth has spent many springs wanting [...]

Card Data Security Compliance

According to a new report by Verizon Communications Inc, our out of five global retailers and other merchants failed interim tests to determine whether they are in compliance with payment card data security standards. This [...]

Russia is studying a mandatory biometric registration

Political Russian Party LDPR has drafted a bill that would obligate all citizens to submit fingerprinting and DNA profiling on a biometric ID Card, in order to improve security. It also suggests that a new [...]

A difficult task awaits Apple over the next six months

Apple’s ambitions put the company at a relatively heavy agenda in 2015. Apple watch defies chonique and Apple must find a place for it either in the jewelry and luxury boutiques or in the horlorgeries. [...]

Triple cooperation for a secured tablet

At CeBIT 2015 in Hanover, Samsung, BlackBerry and IBM unveiled a tablet called SecuTablet. This is a model of Galaxy Tab 10.5 Samsung S aimed at both professionals and the general public and in which [...]

The danger of connected cars

A recently filed class action lawsuit claims that Toyota, Ford and General Motors would knowingly put consumers at risk by selling cars including connected features likely to be controlled remotely by hackers. The complaint filed [...]

Chinese Smart Cards

Digital enters into the life of the Chinese. Beijing has already issued more than 15 million social security cards and more than 70 million municipal transport cards. At the same time, the number of identification [...]

Personal Data Security : Fears and proposed cure

According to the recent study, State of Privacy, published by Symantec, the quality of customer service focuses on data security, a decisive factor in the purchase for 88% of consumers. Most French believe that businesses [...]

Technogym cooperates with Apple Health

Technogym, an expert in the manufacture and distribution of products, services and solutions of exercises for well-being and health, had announced during the IHRSA Congress 2015, the integration of its business with Healthkit, the Health [...]

“Enterprise Immune System” Technology is integrated into the BT security offering

BT incorporates the technology developed by Darktrace company specialized in the cyber defense sector. In this way, BT will have on the overall world map, the new generation of cyber intelligence and cyber threat detection. [...]

About the indiscretions of the electronic ID card

The personal information contained in the electronic ID card poses unexpected problems. If the social group wants to know who Mr. Durand is, Mr Durand is probably not ready to explain who he is. And [...]

The Wide Range of the RFID Offering

The RFID industry is evolving and deployments are improving and diversifying every year. Among the latest award-winning applications, we note that DIRECTV uses RFID to count 200,000 of broadcast equipment parts, which significantly reduces the [...]

NFC Smartphone – Remote Control of Digital Living

Post only available in French.

Portable sensors and medical knowledge

Therapeutic and medical cares, in conventional medicine, are based on the experience gained and on cares effectiveness. The approval of these is under the responsibility of licensed and accredited entities. So far, traditionally, new therapies [...]

Fujitsu Biometric Identity Multi-factor Verification

Fujitsu currently markets a multi-factor identity verification device, called “PalmSecure ID Match.” This device is designed to meet a variety of security-sensitive applications, including those in the financial, retail, social security and other public services. [...]

We must take care of the security of the new medicine

Hospitals, clinics and insurers are constantly the target of malicious online attacks. According to ABI Research study, professional health sector is poorly prepared to deal with cyber threats. Yet the value of personal health information [...]

The HTTP protocol is not suitable for IoT

HTTP belongs to the old Internet. The world of the Internet of Things (IoT) is for small devices that require only very small interactions and consume very little power. An HTTP request uses complex headers [...]

Municipal ID cards in New York

Hundreds of people came to register for the municipal ID program of the City of New York (NYID Card). This measure applies to anyone over 13 years old residing in the city which is likely [...]

Articles précédents

© 2015 Strategies Telecoms & Multimedia | Contact |  -