Forgot a password? Try 'way2many'; better on-line security has meant more passwords, and more frustrated users
Article Abstract:
As more personal information is stored in computer networks, users need different passwords to access their personal information. The Gartner Group estimates that a business with 2500 computers and users spends $850,000 per year on password administration. For security reasons, system administrators often recommend creating passwords out of a mixed string of digits, letters, and punctuation. While these passwords are more difficult to hack, they are also more difficult for users to remember. The password recovery business is growing. At the same time, security companies are developing controlled access systems based not on text but on fingerprints or retinal scans.
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1999
User Contributions:
Comment about this article or add new information about this topic:
Capturing not-so-still life: Webcams in many flavors
Article Abstract:
Webcams are basically a lens, a sensor, a chip to convert the sensor image into data, and software so the user can view the data on a PC. Devices in the price range for home use have plastic lenses, as opposed to higher quality glass. Sensor resolution comes in two types: either the low cost Common Interchange Format (CIF) or the higher quality, higher cost Video Graphics Array (VGA). Image sensors themselves are either Complementary Metal Oxide Silicon (CMOS) or Charge-Coupled Devices (CCD). Both work well in mid-level light. These cameras can produce either a still or motion video images. 40 frames per second or higher gives the least jerky motion image.
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1999
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: For better or for worse. Time and tide, froth and foam. Donations welcome
- Abstracts: Scramble to fix computer security flaws. Microsoft discloses more flaws in software. Security flaw is discovered in several Unix programs
- Abstracts: Dust that may have eyes and ears. Crowding transistors onto a chip. Vivid colors in the palm of your hand
- Abstracts: Taming of the I.T. shrew. Workplaces of the world, fragment: the online elite don't have to stay put in an office or company, but who is looking out for the rest of society?
- Abstracts: Who holds the purse strings? Back on the rails: Australia's two steel makers are going different ways in their search for growth in a tough business