Search Details

Word: computerizes (lookup in dictionary) (lookup stats)
Dates: during 1980-1989
Sort By: most recent first (reverse)


Usage:

The panel also recommended Cornell develop auniversity-wide policy on computer abuse

Author: NO WRITER ATTRIBUTED | Title: Cornell Report Reviews Morris Computer Virus | 4/3/1989 | See Source »

Also fueling India's wider ambitions is the desire to alter the common perception, particularly in the West, that it remains a backward nation mired in superstition and squalor. In fact, alongside the impoverished land of beggars and cardboard shacks there has risen a high-tech, postindustrial state led by...

Author: /time Magazine | Title: India The Awakening of An Asian Power | 4/3/1989 | See Source »

Think this is only the stuff of fictional covert operatives? Think again, and welcome to the new world of biometric security. It is a world in which traditional keys and combination locks could eventually become obsolete. Increasingly, access to buildings, rooms and vaults will be controlled by computerized machines that can recognize personal characteristics of people seeking entrance: fingerprints, blood-vessel arrangements in the eye's retina, voice patterns, even typing rhythms. These biometric machines have special sensors that pick up the characteristics, convert them into digital code and compare them with data stored in the computer's memory bank...

Author: /time Magazine | Title: Technology: Putting The Finger on Security | 4/3/1989 | See Source »

Biometric eye scanners are in use in many high-security settings. One model, manufactured by EyeDentify of Beaverton, Ore., works by directing a low- intensity infrared light through the pupil to the back of the eye. Within two seconds the retinal pattern, viewed by a camera, is compared with data...

Author: /time Magazine | Title: Technology: Putting The Finger on Security | 4/3/1989 | See Source »

Another biometric technique, voice verification, works by creating a digital picture of an individual's vocal tract. Bad colds or even Rich Little can not trip up the device, since it recognizes the physiological characteristics that produce speech, not sound or pronunciation. Using this device is as easy as saying...

Author: /time Magazine | Title: Technology: Putting The Finger on Security | 4/3/1989 | See Source »

Previous | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | Next