Future of Computing
Digitial Identity in Cyberspace
Digitial Identity in Cyberspace: "Executive Summary
Currently there is no generic system for identification in cyberspace. It is not possible to absolutely identify an entity or to accurately tell whether an object has a specific characteristic. Digital environments have inherent differences from real space which causes this discrepancy, and when implementing an identity system for cyberspace one needs to consider more than just the architectural nature of the system - any system chosen will have social repercussions which need to be also taken into account.
Identity is a unique piece of information associated with an entity. Identity itself is simply a collection of characteristics which are either inherent or are assigned by another. The color of a person's hair and whether or not another thinks he is attractive is part of a person's identity.
Interactions done in real space inherently carry the identity of the person originating the transaction. Generally, physical traits are carried along in a transaction - for example when one purchases a book from a book store, the book dealer may remember the buyer's face or build.
The difference between real space and cyberspace is that the essence of any digital transaction is unbundling. Ones and zeros do not inherently carry any separate information along with them; a real space transaction carries along inseparable secondary information. Digital transmissions can only transmit; there is no secondary information encoded in the transmission unless explicitly put there. Thus, for authentication purposes, additional information needs to be carried with cyberspace transactions for identity purposes."
Digital Identity World :: Digital Identity, Digital ID
Digital Identity World :: Digital Identity, Digital ID: "What is Digital Identity?
A Digital Identity is the representation of a human identity that is used in a distributed network interaction with other machines or people. The purpose of the Digital Identity is to restore the ease and security human transactions once had, when we all knew each other and did business face-to-face, to a machine environment where we are often meeting each other for the first time as we enter into transactions over vast distances.
Attributes of a Digital Identity
A Digital Identity only needs to be as complete as a particular transaction requires. That is to say, some transactions require a far more robust Digital Identity than others, since the degree of trust and information required can vary significantly based on the type of transaction. A Digital Identity consists of two parts:
Who one is (identity)
The credentials that one holds (attributes of that identity).
These credentials define a Digital Identity, and they can be quite varied, of widely differing value, and have many different uses. The full Digital Identity is quite intricate and has legal as well as technical implications (here is a MIT white paper on the subject that will give you the idea.) However, the simplest possible Digital Identity consists of an ID (such as a user name) and an authentication secret (such as a password).
In this simplest Digital Identity the user name is the identity while the password is said to be the authentication credential. As computerized systems become more networked and distributed, Digital Identity must become more robust to make complex distributed user interactions easy while achieving the required control and security. Ultimately Digital Identity will become as complex and flexible in use as a real-world human identity."
STENS BIOFEEDBACK: "Through the Nexus-10 we are proud to offer you a Bluetooth enabled solution with internal Flash memory. (for storage of up to 24 hours of data) NeXus-10 offers very high resolution 24 bit data acquisition at up to 2048 samples per second. The built-in state of the art pre-amplifiers measure any electrophysiological signal from DC to 800Hz including raw EMG, EOG and Slow Cortical Potentials. (SCP�s) Because it uses low noise carbon based cables, expensive active sensors are no longer required for electrophysiological signals such as ECG, EMG, EEG, EOG and SCP
Wireless data logging upto 24 hrs
Neurofeedback & SCP training
Human performance & movement analysis
Wellness, Stress response studies
HRV (heart rate variability) research"
GEO World - Mar 2001 - NewsLink
GEO World - Mar 2001 - NewsLink: "Traditional electronic monitoring technology employs ankle transmitters and receivers located in parolees' homes. Such 'house-arrest' systems signal authorities when parolees are home or within about a block radius of their homes, but they're ill equipped to track offenders away from home curfew. Considering many parolees are required to obtain jobs, attend classes and participate in treatment programs, conventional tracking devices often leave large blocks of unsupervised time.
Denver-based Continental Divide Robotics (CDR), however, has developed a mobile electronic monitoring system based on Global Positioning System (GPS) and digital mapping technology that allows police departments and other correctional agencies to monitor offenders 24 hours a day, regardless of location.
Marketed by Boulder, Colo.-based BI Inc. under the brand name 'SkyGuard 500,' CDR's tracking system includes a nonremovable ankle or wrist bracelet (transmitter); a mobile tracking pack that contains a GPS unit, battery and wireless communication device; a central computer system; and a World Wide Web-based user interface (accessible via a standard Web browser). Parolees are required to wear the battery pack in an 'over-the-shoulder' bag whenever they leave home. If a parolee attempts to abandon the pack, an alarm is triggered in the central computing system, which then notifies officers via pager, cellular phone or computer."
Students ordered to wear tracking tags - Tech News & Reviews - MSNBC.com
Students ordered to wear tracking tags - Tech News & Reviews - MSNBC.com: "SUTTER, Calif. - The only grade school in this rural town is requiring students to wear radio frequency identification badges that can track their every move. Some parents are outraged, fearing it will rob their children of privacy."
Vettro: "Vettro mobile applications transform wireless phones and handhelds into powerful, enterprise-connected computing devices. Vettro unlocks the value in existing enterprise systems and generates quantifiable business improvements for field service, mobile sales, and fleet operations.
Transform field service, mobile sales, and fleet operations with:
Unparalleled user experience that enables workers in the field to use applications regardless of cell phone coverage
Completely wireless application management which eliminates the need to ever recall devices from the field
Packaged or configurable applications designed to integrate seamlessly with your existing business processes and systems
Integrated with GPS, bar code scanners, credit card readers, and printers to enable location tracking, real time inventory management, and point-of-service payments
Lowest Total Cost of Ownership through subscription-based licensing, integration with existing systems and software, and deployment on cell phones and BlackBerry handhelds over public networks. "
Company: "TranWare, Inc. is the exclusive developer, distributor and support organization for the TranWare line of ground transportation software systems. The TranWare system has been installed in many locations throughout the United States and Canada. Our staff has been developing solutions for Taxi, Limousine, Shuttle, Paratransit and Courier markets for 15 years."
"Mobile Knowledge provides advanced GPS, wireless and mobile data communications technology to optimize the operation and security of vehicles and other mobile assets for enhanced fleet management applications."
EyeTech Digital Systems-Eye Tracking Device-
EyeTech Digital Systems-Eye Tracking Device-: "Operate your PC... Hands Free!
Designed for people with disabilities.
LAPTOP VERSION NOW AVAILABLE!
Also: Need an eye pointer for your cutting-edge application?
- Marketing, Psychology, or Eye Gaze Research
- Video game
- Computer kiosk
- PDA pointer
- Wearable computer
- Science center
- Art gallery
- Driver or pilot monitoring, etc.
Work with us to create the future...
Our robust algorithms excel with glasses, and eye / skin color variations. "
David Ward: Dasher: Intro
David Ward: Dasher: Intro: "Existing devices for communicating information to computers are either bulky, slow, or unreliable. Dasher is a data entry interface incorporating language modelling and driven by continuous two-dimensional gestures, e.g. a mouse, a stylus, or eye-tracker. Tests have shown that, after an hour of practice, novice users reach a writing speed of about 20 words per minute while taking dictation. Experienced users achieve writing speeds of about 34 words per minute, compared with typical ten-finger keyboard typing of 40-60 words per minute.
Although the interface is slower than a conventional keyboard, it is simple to use, and could be used on personal data assistants and by motion-impaired computer users. Dasher can readily be used to enter text from any alphabet. "