SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Identix (IDNX) -- Ignore unavailable to you. Want to Upgrade?


To: brad greene who wrote (15432)11/2/1999 10:20:00 AM
From: R. Jaynes  Read Replies (1) | Respond to of 26039
 
Here's an article that, if I read it correctly, appears to say you can use digital certificates to positively identify an individual. Some excerpts -

Ruesch decided to use an extranet for managing and executing international payments for its 2,000 to 4,000 RueschLink clients expected to be signed up by this time next year. The company considered a range of security options, including biometrics such as fingerprint or voice identification; smart cards; and one approach that required users to enter their personal identification number into a desktop reader every five minutes. But the company rejected those as too cumbersome. "E-business isn't about barriers," Szoc says.

Instead, Ruesch decided on digital certificates, which serve as a legal signature and produce a binding confirmation of a business transaction. That makes it hard for users to repudiate an agreement later. They also serve as proof that people are who they say they are. Ruesch chose the Secure Extranets system from CyberTrust Solutions Inc., a GTE company. "We thought about VeriSign, but we had a relationship with GTE Internetworking, and the pricing is competitive," Szoc says.
.
.
.
.
A basic security measure includes verifying whether the people dialing in are who they say they are. The easiest approach is to require use of passwords.

A more complex-but more secure-approach is using digital certificates and a public key infrastructure (PKI) to authenticate a user's identity, says Jeff Barnell, VP of technology for VPNet Technologies Inc., which develops virtual private network technology and services. "It works like a driver's license that you use to cash a check. You have to trust the Department of Motor Vehicles enough to know they issued this to so-and-so, and that that's enough to verify they are so-and-so," Barnell says.
quoteserver.dogpile.com

Rick



To: brad greene who wrote (15432)11/2/1999 12:00:00 PM
From: David  Respond to of 26039
 
IDX at COMDEX . . .

IDX has not concentrated on COMDEX before. Until this year, the big show has been CTST. The fact that IDX is showing up at COMDEX and investing some money in displaying itself (a "ballroom" and free samples) tells me that the company's internal image is reorienting towards software and the PC industry. This is progress.

As to what we can expect, at a minimum I'd say the release of the DFR-300 and the rest of the BioLogon suite (i.e., BioSafe and BioShield). There will probably be announcements on PC end users, as well, and as much press as they can gin up. At the maximum, I'd hope for something from Motorola -- but not from a PC maker. And Motorola isn't a sure thing on a product announcement.

Brad, I don't think a China master reseller announcement will stop the pressure on the stock price today.