Home Technology

Technology

Secure colour personalisation

0
Due to the global use of electronic identity documents, conventional paper documents are increasingly being replaced by modern polymer cards. For these cards, polycarbonate...
cryptojacking

Part 1: Cryptojacking

0
A review of cryptojacking To some degree or another, most of us have heard of the term “virtual currency”. This is essentially the cloud-based version...

A new anti-counterfeiting technology

0
These days, luminescent materials are widely used as anti-counterfeiting measures in security documents. When exposing a banknote to ultraviolet light the illuminants can be...

Fastpass

0
Up to now, document inspection systems were primarily designed as tools to support experienced users when examining documents. Nowadays, such devices are being used...

3D enrolment improves face recognition

0
Although 2D face recognition technology has improved recently, the quality of 2D images captured is often still poor, due in part to the sensitivity to capture...

Part 1: The Industrial Internet of Things (IIoT)

0
Introduction There are many devices, computers, workstations, wireless devices, and even IT infrastructures that are now interconnected amongst one another. There is a technical term...
cryptojacking

Part 1: Cryptojacking