Word: computerizes
(lookup in dictionary)
(lookup stats)
Dates: during 1980-1989
Sort By: most recent first
(reverse)
The panel also recommended Cornell develop auniversity-wide policy on computer abuse
Also fueling India's wider ambitions is the desire to alter the common perception, particularly in the West, that it remains a backward nation mired in superstition and squalor. In fact, alongside the impoverished land of beggars and cardboard shacks there has risen a high-tech, postindustrial state led by...
Think this is only the stuff of fictional covert operatives? Think again, and welcome to the new world of biometric security. It is a world in which traditional keys and combination locks could eventually become obsolete. Increasingly, access to buildings, rooms and vaults will be controlled by computerized machines that can recognize personal characteristics of people seeking entrance: fingerprints, blood-vessel arrangements in the eye's retina, voice patterns, even typing rhythms. These biometric machines have special sensors that pick up the characteristics, convert them into digital code and compare them with data stored in the computer's memory bank...
Biometric eye scanners are in use in many high-security settings. One model, manufactured by EyeDentify of Beaverton, Ore., works by directing a low- intensity infrared light through the pupil to the back of the eye. Within two seconds the retinal pattern, viewed by a camera, is compared with data...
Another biometric technique, voice verification, works by creating a digital picture of an individual's vocal tract. Bad colds or even Rich Little can not trip up the device, since it recognizes the physiological characteristics that produce speech, not sound or pronunciation. Using this device is as easy as saying...