Featured Archives - Origin Soft Tech https://originsofttech.net/category/featured/ Tech Blog Wed, 17 Nov 2021 14:12:40 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://originsofttech.net/wp-content/uploads/2020/12/ORIGIN-SOFT-TECH-f-150x150.png Featured Archives - Origin Soft Tech https://originsofttech.net/category/featured/ 32 32 Biometric Technology In The 21st Century https://originsofttech.net/biometric-technology-in-the-21st-century/ Wed, 10 Nov 2021 13:59:15 +0000 https://originsofttech.net/?p=208 Technological advancements in the 21st century paved the way for many improvements in the human...

The post Biometric Technology In The 21st Century appeared first on Origin Soft Tech.

]]>
Technological advancements in the 21st century paved the way for many improvements in the human lifestyle. Biometric technology, for example, expanded its reach from state use to corporate and personal use, completely changing the standards of security. Revisit the developments in biometrics since the beginning of the digital age.

  • 2000 West Virginia University, in collaboration with the FBI, developed a bachelor’s program on biometric systems. Although it was non-accredited, it was the first program of its kind.
  • 2002 – The International Organization for Standardization (ISO) created a subcommittee to standardize biometric solutions, data exchange, and interoperability across various systems.
  • 2005 – SRI International (formerly Sarnoff Corporation), in the Biometrics Consortium Conference, demonstrated the potential to collect iris images from individuals walking through a portal. This ability was coined “Iris on the Move,” marking the culmination of the research and prototype sponsored by the Intelligence Technology Innovation Center (ITIC) and the Defense Advanced Research Projects Agency (DARPA).
  • 2008 – Google enabled the voice search in BlackBerry Pearl’s mobile version of Google Maps. Apple Inc. also incorporated this capability in iPhone later in November.
  • 2011 – Siri, a digital personal assistant via voice commands, was launched. 
  • 2013 – Apple Inc. designed and released a fingerprint recognition feature, TouchID, in iPhone 6 and iPhone 6 Plus, the iPad Air 2, and the iPad Mini 3.
  • 2018 – the first MasterCard biometric card was released, which combines the chip technology with fingerprints to verify in-store purchases. In the same year, Byton introduced an electric vehicle that allows drivers to control several features via gestures and voice commands.
  • 2019 – European Union implements the revised Payment Services Directive 2 (PSD2) requiring Strong Customer Authentication (SCA) in digital platforms. The legislation aims to reinforce payment authentication by asking customers for two of the following three:  something they know (password or PIN), something they own (cellphone or token), and something they are (fingerprint, facial features). Delegated authentication simplifies and streamlines this process by allowing the merchant to directly authenticate users, thereby facilitating the “one-click purchase” experience.

Biometric technology now plays a big part in the digital security of various services. Keep up with the market’s pace and integrate biometric tools with LoginID FIDO-certified authentication solution.  

Biometric Technology: a brief history

The post Biometric Technology In The 21st Century appeared first on Origin Soft Tech.

]]>
Top Pitfalls Of Mobile Archiving https://originsofttech.net/top-pitfalls-of-mobile-archiving/ Thu, 18 Feb 2021 13:18:13 +0000 https://originsofttech.net/?p=173 In 1931, a term coined by the best-seller book written by James Truslow Adams titled...

The post Top Pitfalls Of Mobile Archiving appeared first on Origin Soft Tech.

]]>
In 1931, a term coined by the best-seller book written by James Truslow Adams titled Epic of America started the figurative expression, “American Dream.” This aspiration jot down in James Adam’s book is a goal that every American desire. It holds an ambition that an individual may live a better and a luxurious life. Hence, each person works hard to afford that prosperous livelihood. 

During the 1970s, the Information Age, also known as the Digital Age, Computer Age, or the New Media Age, began to disperse in the 70th year of the 20th century. This era is the period that drove the generation to effortlessly accessing information and processing knowledge. The instrument that redirects the genesis’ turning point is the virtuosos’ invented gadgets, such as personal computers, laptops, electronic tablets, and notably, mobile phones, which is the most the utilized device. 

However, the geniuses’ advantageous inventions became the source of corrupted undertaking by the fraudsters: The wicked predators that prey on ignorant and not tech-savvy people. They target those who do not know the confidentiality of some of their information. Regrettably, these vultures are already increasing in number that millions to billions of sums of money are vanishing. 

Have you wondered what is inside the mind of a scammer?

The underlying justification of a deceitful person is greed. The love of money can be evil. It encourages people to deceive their fellows into earning effortlessly. Thus, numerous authorities implemented different legislative chassis to monitor SMS, MMS, phone calls, video calls, and any applications or gadgets for communication between traders and consumers. Like the EU’s Markets in Financial Instruments Directive II, the Public Records Laws in the public sector and Financial Industry Regulatory Authority, and the Securities and Exchange Commission in the US financial industry.

Unfortunately, although these human-made creations, such as mobile archiving, have pros, it is not surprising to possess several cons. 

For a better insight into the top pitfalls of mobile archiving, TeleMessage established an infographic to spread the word:
Mobile-image

The post Top Pitfalls Of Mobile Archiving appeared first on Origin Soft Tech.

]]>