|
Palm recognition In palm recognition a 3-dimensional image of the hand is collected and compared to the stored sample. Palm recognition devices are cumbersome artefacts (unlike fingerprint and iris recognition devices) but can absorb perform a great amount of identification acts in a short time. They are therefore preferably installed in situations where a large number of people is identified, as in airports. |
|
|
|
1940s - 1950s: The Development of Early Robotics Technology During the 1940s and 1950s two major developments enabled the design of modern Numerical control was invented during the late 1940s and early 1950s. It is a method of controlling machine tool axes by means of numbers that have been coded on media. The first numerical control machine was presented in 1952 at the First teleoperators were developed in the early 1940s. Teleoperators are mechanical manipulators which are controlled by a human from a remote location. In its typical application a human moves a mechanical arm and hand with its moves being duplicated at another location. |
|
|
|
Face recognition In order to be able to recognize a person, one commonly looks at this persons face, for it is there where the visual features which distinguish one person from another are concentrated. Eyes in particular seem to tell a story not only about who somebody is, but also about how that persons feel, where his / her attention is directed, etc. People who do not want to show who they are or what is going on inside of them must mask themselves. Consequently, face recognition is a kind of electronic unmasking. "Real" face-to-face communication is a two-way process. Looking at somebody's face means exposing ones own face and allowing the other to look at oneself. It is a mutual process which is only suspended in extraordinary and voyeuristic situations. Looking at somebody without being looked at places the person who is visually exposed in a vulnerable position vis-à-vis the watcher. In face recognition this extraordinary situation is normal. Looking at the machine, you only see yourself looking at the machine. Face biometrics are extracted anonymously and painlessly by a mask without a face. Therefore the resistance against the mass appropriation of biometrical data through surveillance cameras is confronted with particular difficulties. The surveillance structure is largely invisible, it is not evident what the function of a particular camera is, nor whether it is connected to a face recognition system. In a protest action against the face recognition specialist According to |
|
|
|
Advertising Advertising as referred to in most economic books is part of the marketing mix. Therefore advertising usually is closely associated with the aim of selling products and services. Still, developments like "branding" show a tendency towards the marketing of not only products and services, but of ideas and values. While advertising activities are also pursued by political parties, politicians and governmental as well as non-governmental organizations, most of the money flowing into the advertising industry comes from corporations. Although these clients come from such diverse fields, their intentions hardly differ. Attempting to influence the public, their main goal is to sell: Products, services, ideas, values and (political) ideology. |
|
|
|
Xerxes Xerxes (~519-465 BC) was Persian King from 485-465 BC. He led his Army against the Greek but finally was defeated. He was the father of Alexander the Great. |
|
|
|
Enigma Machine The Enigma Encryption Machine was famous for its insecurities as for the security that it gave to German ciphers. It was broken, first by the Poles in the 1930s, then by the British in World War II. |
|
|
|
Extranet An Extranet is an Intranet with limited and controlled access by authenticated outside users, a business-to-business Intranet, e.g. |
|
|
|
Internet Relay Chat (IRC) IRC is a text-based chat system used for live discussions of groups. For a history of IRC see Charles A. Gimon, IRC: The Net in Realtime, |
|
|