SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Identix (IDNX) -- Ignore unavailable to you. Want to Upgrade?


To: steve who wrote (16873)2/15/2000 12:34:00 AM
From: steve  Read Replies (3) | Respond to of 26039
 
A Novell tidbit...

Novell Introduces iChain to Link Multiple Organizations through the Net

<<extract>>-- Authentication Proxy -- is responsible for the authentication of all users to the network using various means such as passwords, tokens, smart cards, certificates, and biometrics. The authentication server also provides a single sign-on for all applications the user has access to.

Availability
iChain will be available via a controlled release to select partners within 60 days. The iChain solution will be available from Novell Channel partners as well as via Novell Consulting and System Integrator partners later this year. Please visit novell.com for more information.

prnewswire.com

ps, this link included for you to explore... novell.com

---------------------------------------------------------------------

I'm now I'm reading too much into this, but;), it seems to me that the American Institute of Certified Public Accountants (AICPA) endorses fingerprint scanning... Would it be worthwhile for IDX to pursue such an endorsement for their hardware/software?

( BW)(NY-AICPA) AICPA Offers Tips for Protection From e-commerce Hackers

<<excerpt>>5. Limit the number of individuals who may access controls to your e-commerce business: Access to controls should be implemented
according to the basic rule that access is only provided to the
minimum number of people for the minimum possible number of
systems and for the minimum amount of time required to do the
job. Use authentication methods such as passwords, smart cards,
PIN numbers or fingerprint scans to access your systems. Utilize
digital certificates to verify electronic identities. Use
encryption to render data unintelligible to unauthorized users
who do not have access to the decryption key. Utilize anti-virus
software and keep it up-to-date. Software should be installed on
individual client machines, servers or firewalls.

businesswire.com
------------------------------------------------------------------
Hmmm... Maybe IDX can help me into one of these...;)

Aiming to Take the High-End Subdivision to Another Level

Real estate: Capital Pacific Holdings and other developers are betting there's a huge Southland market for mass-produced homes costing $1 million or more

<<excerpt>>Options include a system that will page the owner if the temperature in the wine cellar grows too warm or cool; and an electronic security system that scans fingerprints, retinas or tokens for home entry, enabling the owner to give visitors, gardeners or nannies partial or full access to the house.

latimes.com

steve